The hard reality of Information Systems

Introduction In 2020, 46% of businesses in the UK had cyber security breaches or attacks (Department for Digital, Culture, Media & Sport, 2020). Information security is based on three fundamental characteristics specifically the confidentiality, integrity, and availability – known as the CIA triad (Chapple, 2018). IT leaders need to keep abreast with the latest technologies and practices to ensure that […]

Information Security Policies

Rationale As organizations are adapting to new security measures, a revision of the internal IS security policies is necessary. The activities to undertake such an initiative can be summarized in 8 tasks as per table below. Task Activity Comments 1 Review existing security policy and identify gaps Ensure if readability of the policy is adequate for all stakeholders. 2 Research […]