IT security practices

Mobile technology, cloud computing and bring your own device (BYOD) policies have created new security issues and concerns for information technology (IT). Learn the benefits, issues and risk-management strategies for good security practices.

Get your downloadable electronic copy.

Download Now

Security is an ongoing concern, as you and your clients must continuously protect IT systems and data from unauthorized access, use, disclosure, manipulation or destruction.

Security: Technology Spotlight provides an executive summary of the benefits, issues and risk-management strategies for effective security practices.

Learn how to manage top security concerns, including:

  • protecting data on lost or stolen mobile devices
  • securing personally-owned devices (BYOD)
  • preventing cybercrime threats that deceive users into disclosing personal information
  • protecting software vulnerabilities from malware attacks
  • preventing intellectual property theft by cyber-espionage
  • managing negative publicity from security breaches involving customer information
  • protecting against leaks of confidential intellectual property or future business plans