Security policies - the constantly moving goalposts

By on

Far from being the ‘nice to have’ it was once thought to be, IT security has finally reached the level where it is viewed as an essential consideration for businesses today.

Along with word processing software and email systems, the vast majority of businesses at least use username and passwords to authenticate users, as well as tools such as anti-virus software. Many companies have taken this further to incorporate firewalls, intrusion detection software, encryption...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Most popular tech stories

Log In

Username:
Password:
|  Forgot your password?