InfoSec Policies and Standards: Some strategic context for those just diving into this world
CTOvision
MAY 22, 2014
Wireless Policy. How wireless infrastructure devices need to be configured. Some of the assets that these policies cover are mobile, wireless, desktop, laptop and tablet computers, email, servers, Internet, etc. Legal experts need to be consulted if you want to know what level of encryption is allowed in an area.
Let's personalize your content