15.2 – Train and Enforce Policy

15.2 – Train and Enforce Policy
The basis for any organization’s information security is security policy. Many organizations have information security policy in place to assure that their information is always protected. Adopting security policy document in itself is not enough, it is essential to make sure that the policy is efficiently implementable. Indeed, there is need for enforcement and monitoring. The following are the steps for achieving policy enforcement and monitoring: Implementing Security Awareness Program Communicating Policy Effectively Monitoring Implementing Security Awareness Program The key to enforcing security policy is education. Teaching employees on the requirement for security policy is essential as it will assist…
To access this content, you must subscribe to this Consolidated Tekedia Subscription, or log in if you are a member.

Share this post