IT-Sicherheit
Pillars of Your Community
13.01.2003
Von Meg Mitchel-Moore
In addition, Hughes points out, it's critical to look at businesspartners outside your own firewall with whom you might be sharinginformation and address potential vulnerabilities in the securitypolicy. "If you're in manufacturing and you're sharing proprietaryinformation with the vendors helping you build, you might be secure,but how secure are your vendors?" he asks. A solid security policycovers all those bases.