Keeping sensitive information away from those
with malicious intent is becoming a growing problem for many companies and a
genuine concern for customers, business partners, and consumer and public
interest groups. The alarming rate of consumer identity theft, threats of
cyber-terrorism, and increased incidents of corporate espionage contribute to
this drive to find solutions to keep sensitive information private and secure.
This information is at the core of your
business-transaction records, financial data, identifying customer information.
The value of this information makes it very attractive to those with ill
intentions. Security policies the rules that all IT deployments and new
applications should follow to meet the organization's security needs.
This white paper discusses about how
enterprises, before developing a good, comprehensive policy, should perform an
assessment to determine its weaknesses and requirements and recommends few
guidelines that needs to be followed.
For more on this white paper, log onto:
http://www.bitpipe.com/data/document.do?res_id=1104500408_586&type=lg
Source: by RSA Security