Skip to Main Content
USA
Select regional store:
Get ahead in Cloud security – save 25% on selected training courses. Find out more.
Security: The Human Factor

Security - The Human Factor


SKU: 3068
Authors: Paul Kearney
Publishers: IT Governance Publishing
Format: PDF
ISBN13: 9781849280648
Pages: 60
Published: 21 Dec 2010
Availability: Always Available
Format: ePub
ISBN13: 9781849281843
Pages: 60
Published: 21 Dec 2010
Availability: Always Available

Security - The Human Factor looks at the human challenges associated with information security and assesses the consequences of failing to meet them. This pocket guide also, and – most importantly – looks at the steps organizations can take to make themselves and their information more secure.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account. Apply online today or call our service center team on +1 877 317 3454.

Options:
Price: $14.95
Overview

Overview

Your business information is likely to be much more valuable than the hardware on which it is stored. The loss of a laptop might set you back $500, but if the files on the laptop included sensitive customer data or the blueprint for a new product, the cost of repairing the damage would run into thousands.

The consequences of a data breach range from alienating customers to heavy fines, or even criminal prosecution. While technologies, such as antivirus software and encryption, can offer some protection against cybercrime, security breaches are most often the result of human error and carelessness.

Security: The Human Factor looks at the challenges associated with information security, the consequences of failing to meet them and – most importantly – at the steps organisations can take to make themselves and their information more secure. 


Improve information security

Improving information security within your organisation, therefore, has to encompass people and processes, as well as technology. Motivating your team and making them more aware of security concerns should be at the heart of your information security strategy. At the same time, the processes you have in place to address information security issues need to be straightforward and properly understood if you want your employees to adhere to them.


BT’s approach

This pocket guide is based on the approach used by British Telecom (BT) to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.


Read this guide to:

  • Win business by demonstrating that there are effective safeguards for your business information in place, you can strengthen the trust of partners and customers and improve the image of your brand. Effective information security may even provide the extra advantage you need to close an important deal.
  • Protect your organization from social engineering attacks. Once fraudsters have gained the trust of a company employee they will then seek to exploit that trust for their own criminal purposes by persuading the employee to divulge confidential information. This pocket guide will help your staff to be on their guard against this type of threat.
  • Improve processes and procedures. The guide sets out some basic precautions that employees can take, both in and outside the workplace, to reduce the risk of a data breach.
  • Enable people to make a positive contribution to security. The processes you have in place to manage your information security need to be observed. At the same time, you are unlikely to achieve the optimum level of protection unless your workforce understands the reason why these policies are necessary. This pocket guide shows you how you can enhance your information security by engaging and motivating your staff.
About the author

Paul Kearney

Paul Kearney is chief security researcher in the Security Futures Practice, BT Innovate & Design. He is based at BT’s Adastral Park technology centre near Ipswich, and has worked in information security research since 2001. Paul Kearney is a Certified Information System Security Professional (CISSP) and a full Member of the Institute Of Information Security Professionals (MInstISP). He holds a PhD in theoretical physics from the University of Liverpool, and is the co-author of the White Paper, “Human Vulnerabilities in Security Systems”, published in 2007 by the Cyber Security Knowledge Transfer Network.

Customer reviews

top
This website uses cookies. View our cookie policy
Save on
Training
Loading...