|
In addition to the technical methods used to secure networks and computers, via electronic rules, it's important to create rules for the people that will be using those computers and networks. Many times, you cannot engineer away the cause of the problem: the user. Having a clearly defined security policy is critical to the success of any risk management plan. |
|