Sending an email from an odd-looking address and seeing if employees open the email is one way to gage the relative wariness of employees. If employees open up the email, it staff can include a message warning them that this is just the kind of message employees should delete.
Creating 'backdoor' threats and viruses to attack a system, and see if it is vulnerable is one potential 'fire drill' that can be used by the organization to assess potential areas that can be compromised. General assessments of the knowledge of non-it and it staff of proper security procedures and the areas which can pose new threats are also essential.
Simple systematic procedures, such as requiring employees to change their passwords on a regular basis, and having passwords screened for complexity, must be built into the system, as well as more complex tests of efficacy. To ensure that these measures are working requires formal audits, but also a self-critical attitude on the part of staff members in both technologically-related and non-technologically related jobs.
Q7. Keeping the information security program functioning and improving over time
Monitoring and quality testing must continue, but it must shift, change, and improve with the evolving security...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now