Committing available resources to the threats that occur most often and can cause the greatest damage will allow small enterprises to create better IT security without breaking the bank.
Written by James Quin
Recently, Info-Tech Research Group conducted a survey designed to gauge organizational IT security maturity. A component of the survey involved investigating security incident information, specifically regarding the following threats:
Don't let your organization's data become inadvertently exposed by changes to your authority scheme.
Written by Carol Woodbury
More organizations are seeing the business requirement to secure critical data. Whether it's human resources information, payroll information, or credit card information, organizations are making the effort to set database access controls to appropriate settings—either "deny by default" (*PUBLIC *EXCLUDE) or "read only" (*PUBLIC *USE).