Posts

Showing posts from October, 2019

Interview

Image
Title of the Issue: DEVELOPING AND IMPLEMENTING AN ACCEPTABLE USE POLICY IS ONE OF THE FIRST STEPS IN CREATING A COMPANY WIDE CULTURE OF TECHNOLOGY RISK MANAGEMENT. Title of the Article: Privacy and Security Source:https://www.itispivotal.com/post/how-to-create-an-acceptable-use-policy Author: BETH STEWART a) Summary Narrative:             Sometimes referred to as an Internet Policy, an Acceptable Use Policy (AUP) is a formal set of rules governing computer, network and data usage that can help limit your exposure to data breaches, minimize cyber risks and protect your business’ reputation. Recent technology developments, laws and regulations have made creating an effective AUP more challenging. Cybersecruity training can help to ensure end-users adhere to your AUP.   When the reasoning behind your policy is understood, employees are more likely to recognize the value of it and to adhere to it.  By ...