Skip to Main Content
USA
Select regional store:
Get ahead in Cloud security – save 25% on selected training courses. Find out more.
IT Induction and Information Security Awareness

IT Induction and Information Security Awareness


SKU: 2882
Authors: Valerie Maddock
Publishers: IT Governance Publishing
Format: PDF
ISBN13: 9781849280341
Pages: 51
Published: 09 Feb 2010
Availability: Always Available
Format: ePub
ISBN13: 9781849281195
Pages: 51
Published: 09 Feb 2010
Availability: Always Available

This pocket guide puts forward the case for an organisation-wide, and fully supported IT Induction and Information Security Awareness Program.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account. Apply online today or call our service center team on +1 877 317 3454.

Options:
Price: $14.95
Overview

Where your information security is concerned, prevention is better than cure.

If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological, failings. However, the human factor usually receives far less attention.


This book will cover the following:

  • Training

    Computer systems are complex, so people who work with them often need to be trained in how to use them correctly. This applies especially to your company’s information security. The loss of a memory stick by a careless employee, or the downloading of a file that contains a virus, may be all it takes to cause a security breach.

  • Practical advice

    This book offers you practical advice on how to develop an IT Induction program for your staff that can help safeguard your business information. By providing your employees with simple instruction in good IT working practices, and by making sure they know what is expected of them, you can strengthen your company’s information security and reduce the risk that your data will be stolen or lost.

  • A sense of responsibility

    Encouraging good corporate working and a strong sense of responsibility are, the author argues, essential for the protection of your business information. She shows you how to strike the right balance in your approach to staff training, thereby enabling you to provide your employees with an IT Induction that is at once informative and accessible.


Benefits to business include:

  • Reduce the likelihood of a damaging security breach.

    Putting in place a program of IT Induction will help ensure that your company’s staff are following information security best practice.  Educating employees in good IT working practices will help them to avoid the errors that might otherwise put your organization at risk.
  • Protect the company’s reputation

    The damage an information security breach can do to your business goes beyond the initial cost of clearing up the mess. Without proper staff training, the danger is that theft or loss of data will damage your company’s reputation. You need to provide your staff with a proper IT Induction in order to preserve good relations with your customers.

  • Avoid legal complications

    IT offers business new, less formal means of communication. Employees write e-mails in a different style from the way they write letters. However, contracts can be made or broken via e-mail, and e-mail correspondence can be cited in litigation. An IT Induction program will give your staff the appropriate guidance on e-mail communication with the clients or business partners of your company.

  • Manage employee working practices

    Laptop computers and broadband mean that for many employees, the boundaries between work and home are becoming blurred. If you allow your staff to mix and match between working in the office and working from home, you need to make sure they know what they have to do to safeguard your firm’s data both inside and outside the office.

As the author comments, “Empowering and trusting employees, through good educational practices and advice specific to their needs, is the best solution to address information security risk".

About the author

Valerie Maddock

Valerie Maddock holds a degree in Computer Science from the UK's Open University and has over 35 years’ experience in IT. Since 1996 she has been employed in the IT department of the Salvation Army UK. She created the department’s IT Learning and User Support Unit, and also developed an online IT Induction program for the needs of the Salvation Army’s staff.

Customer reviews

top
This website uses cookies. View our cookie policy
Save on
Training
Loading...