Documents
don’t walk out of the office on their own. Having strict rules about who can
physically access your offices and how they gain entry can decrease the
likelihood that an unauthorized individual is present to steal information. The
next step is to ensure that your policy documents how physical information is
stored and destroyed.
Wednesday, August 29, 2012
Monday, August 20, 2012
Information Security Best Practices: Vendor Management
You’re only
as strong as your weakest link, and when you work with third-party providers
their information security downfall can become your issue. Make sure you
document which vendors receive confidential information and how this
information is treated when in the custody of the vendor. The lack of strict
vendor guidelines could increase the risk of releasing your customers’ private
information.
Subscribe to:
Comments (Atom)