Strategien


IT-Sicherheit

Pillars of Your Community

13.01.2003
Von Meg Mitchel-Moore

In addition, Hughes points out, it's critical to look at businesspartners outside your own firewall with whom you might be sharinginformation and address potential vulnerabilities in the securitypolicy. "If you're in manufacturing and you're sharing proprietaryinformation with the vendors helping you build, you might be secure,but how secure are your vendors?" he asks. A solid security policycovers all those bases.

Zur Startseite