Information Technology Reference
In-Depth Information
Communication of the “why” and “what's expected” of security mea-
sures is vital to engaging users to follow policy guidelines and avoid bypass-
ing security measures. In the next chapter, I will examine considerations
and strategies for dealing with the aftermath of a threat's occurrence.
Search WWH ::




Custom Search