|
|
|
|
|
|
Author: Article 10 Integrated Marketing
|
Displaying 1 to 7 of 7 articles |
|
Pages:
1
|
Articles by Article 10 Integrated Marketing |
1. Making your employees care about company data...and the company
June 14, 2013
Making your employees care about company data...and the company
Job satisfaction in the UK continues to be low according to NatCen, an issue that has always had huge implications for information security professionals. But best practice bespoke employee information security awareness campaig...
|
|
|
2. BYOD information security management: Too much focus on tech?
June 14, 2013
BYOD is on the rise, bringing a new level of risk to information security management. In response, developers are racing to launch new technologies to manage and secure employee-provided devices. But are we focusing too much on the tech? Keith Ducatel outlines the behavioural considerations that pla...
|
|
|
3. Will a cyber insurance boom affect employee data security training?
June 14, 2013
Will a cyber insurance boom affect employee data security training?
With an increase in high profile data breaches and ICO fines, Keith Ducatel asks whether the anticipated growth in the cyber insurance market is going to affect employee data security training.
Last month’s fine of £...
|
|
|
4. Do your employees understand the value of information?
June 14, 2013
Do your employees understand the value of information?
In protecting your organisation’s vital asset, this is by far one of the most important questions to ask yourself. Article 10 Director Keith Ducatel explains why.
When we deploy a bespoke information security awareness c...
|
|
|
5. Inadequate employee email training could have caused a much larger headache for Cheshire East Counc
June 14, 2013
Inadequate employee email training could have caused a much larger headache for Cheshire East Council
Cheshire East Council in the UK has been fined £80,000 for a simple employee email mistake that caused sensitive information to be disseminated to 180 unintended recipients. It also exposes ...
|
|
|
6. The big staff sting!
June 14, 2013
The big staff sting!
Contentious they may be, but targeted attacks on your own employees can be a highly effective information security benchmarking exercise.
Benchmarking the existing information security know-how of your employees is a crucial first step to an effective awareness c...
|
|
|
7. Who cares about your information security policy revisions?
June 14, 2013
Do your employees read information security and acceptable use policy revisions like they were the next Harry Potter? Or do you have a sneaking suspicion that your hard work may be going unread or being instantly forgotten?
Achieving sign-off on information security policies and AUPs can be...
|
|
|
|
|
|
>
|
|
|
|
|
Author Login |
|
|
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views
|
|
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
|
|
|
|
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
|
|
|
|
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
|
|
|
|
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
|
|
|
|
SUSAN FRIESEN
Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
|
|
|
|
|
STEPHEN BYE
Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
|
|
|
|
|
SHALINI MITTAL
A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
|
|
|
|
|
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
|
|
|
|
JAMES KENNY
James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more
|
|
|
|