Top 10 Network Security Policies

These tips from the IT Business Edge Knowledge Network will help you make a good start on a company policy.

By Enterprise Networking Planet Staff | Posted Oct 7, 2010
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

Companies need to develop and enforce solid security policy plans and in this article on IT Business Edge, the IT Business Edge Knowledge Network offers tips on how to develop these plans. Most security breaches are preventable but even the most security-aware employees will have a lapse every now and then that can leave a business vulnerable. Covering such topics as data security, network security, security policy, and user policies, the tips offered are valuable tools to use when beginning a company policy.


"The purpose of this Info-Tech Research Group policy is to define standards, procedures and restrictions for end users who have legitimate business requirements to access corporate data from a mobile device connected to an unmanaged network outside of a company's direct control. The policy applies to any hardware and related software that could be used to access corporate resources, even if said equipment is not corporately sanctioned, owned or supplied."

Read the Full Story at IT Business Edge

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter