9.2 Monitoring and Security Policies
Because of the costs and implications of security breaches to organizations, technology managers are striving to be more proactive in their security implementations. Among these techniques are the creation of security and incident teams, provision for security training, development of policies, and the implementation of physical and electronic countermeasures. Among the latest approaches finding its way into the security arsenal is the use of employee surveillance and monitoring. While there are benefits to this practice, there are also many issues to consider, including laws and the impact on human resources and performance.
It is one thing to put in place countermeasures to try to prevent security breaches ...
Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.