Remove Fractional CTO Remove Internet Remove Malware Remove VOIP
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Once the information security policy is written to cover the rules, all employees should adhere to it while sending email, accessing VOIP, browsing the Internet, and accessing confidential data in a system. Legal experts need to be consulted if you want to know what level of encryption is allowed in an area. Implement policies.

Policies 107