Toggle navigation
Home
Consulting
Software
nCloud
nProject
nSocial
Research
More
Blog
Forum
Contact us
Shop
My cart
Sign in
Security policies, Procedures, and Technologies
Security policies, procedures, and technologies
Which of the following security policies, procedures, and technologies does your organization use in an attempt to prevent or reduce security events?
Acceptable use policy
Account/password management policies
Big Data analytics
Cloud-based cybersecurity services/technologies
Computer forensics
Regularly conducted security audits
Cyberthreat research
Desktop virtualization
Employee assistance program
Employee monitoring
Employee/contractor background check
Employees required to review and accept written inappropriate use policy on any periodic basis
Government security clearances
Hiring of Chief Security Officer or Chief Information Officer
Incident response team
Include security in contract negotiations with vendors/suppliers
Intellectual property agreement
Internet connection monitoring
Mobile device policy
Monitor online actions of employees at increased risk for insider threat
New employee security training
Nondisclosure agreement
Penetration testing
Periodic risk assessments
Periodic security education and awareness programs
Periodic systems penetration testing
Public law enforcement partnerships
Random security/information/account audits
Regular security communication from management
None of the above/no security policy in place
Do not know