Why Information Security Concern My Company
Evaluate the following statements for your own situation to determine if your company information is safe.
If you answered "no" to any of the these questions, then information security in your company may have a number of security 'holes' that may be vulnerable to threats.
Examples of Threats and Related Security Concerns
|Security Concern Affected|
|Denial of Service Attack||*|
|Power Supply Failure||*|
|Malicious Code Infection||*||*||*|
|Theft and Fraud||*||*|
|Unauthorised Data Access||*||*|
Addressing and taking care of security holes is not necessarily a complicated and costly process. First you need to set the scope of security management required in your company. Look at the risk acceptance level of your company as you determine the scale of security management that meets your business needs.
Refer to the Information Security Management section for more details on the concept and process of Security Management in Corporate Environments.