- Shopping Bag ( 0 items )
Other sellers (Paperback)
-
All (12) from $1.99
-
New (4) from $2.9
-
Used (8) from $1.99
More About This Textbook
Overview
Securing corporate resources and data in the workplace is everyone’s responsibility. Corporate IT security strategies are only as good as the employee’s awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you’ll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include:
Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experi¬ence in the area of information systems security and privacy.
Editorial Reviews
From Barnes & Noble
The Barnes & Noble ReviewAccording to a recent InformationWeek study, 67 percent of U.S. companies say raising user awareness of computer security is a crucial priority for the next year. Thank goodness folks are finally realizing that security is everyone’s business, not just the techies. But how do you train nontechnical folks on security without jargon, bewilderment, or ridiculous expense? With this little booklet, that’s how.
In less than 50 pages, top security consultant Ben Rothke outlines 20 things every employee needs to know, what they should do -- and, equally important, what they shouldn’t do. (Got an email about a security issue from an external source? Don’t handle it on your own. Forward it to your company’s security team or consultant. There are just too many hoaxes out there.)
Rothke’s calm, commonsense tone will help you get folks onboard with the security tasks that really matter. Keeping passwords secure. Transferring files safely. Being secure when you’re accessing the network remotely. Protecting notebooks and PDAs. Disposing of digital media without leaking information. “Social engineering” tricks to watch out for. And how to put all this stuff in context, so you don’t become obsessive or paranoid.
You may need to supplement this booklet with a few of your own company’s policies, but Rothke’s sensitive to that. He’ll take you more than 90 percent of the way. Think about buying a stack of these and passing them around. At $7.95, that’s actually doable. But, hey, it’s not just your employees who need this book. You do, too. Bill Camarda
Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition.
Product Details
Related Subjects
Meet the Author
Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security.
His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design & implementation of systems security, encryption, firewall configuration & review, cryptography and security policy development. Prior to joining ThruPoint, Ben was with Baltimore Technologies, Ernst & Young, and Citicorp, and has provided security solutions to many Fortune 500 companies.
Ben is also the lead mentor in the ThruPoint, Inc. CISSP preparation program, preparing security professionals to take the rigorous CISSP examination.
Ben has written numerous articles for such computer periodicals as the Journal of Information Systems Security, PC Week, Network World, Information Security, Secure Computing, Information Security Magazine, Windows NT Magazine, InfoWorld & the Computer Security Institute Journal. Ben writes for Unix Review and Security Management and is a former columnist for Information Security and Solutions Integrator magazine; and also is a frequent speaker at industry conferences.
While not busy making corporate America a more secure place, Ben enjoys spending time with his family, and is preparing to run in the 2003 Marine Corps Marathon for the Leukemia & Lymphoma Society’s Team In Training, the world's largest endurance sports training program
Ben is a Certified Information Systems Security Professional (CISSP) & Certified Confidentiality Officer (CCO), and a member of HTCIA, ISSA, ICSA, IEEE, ASIS & CSI.
Table of Contents