Share

Downloads

Security Policy: Five Keys to User Compliance

23 May 2012
Download Type: Adobe PDF

Business users are a key part of a company's security, and even the most conscientious employees can introduce serious breaches of security policy.

IT can do everything in its power to secure the company's confidential documents - provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training - yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×