Defence in Depth.  Rings of Security.  Multi-layered protection.  All well known terms when it comes to protecting information assets.  Information can generally be accessed in two ways:  via a network or straight from the disk.  Organisations pay great attention to policies and controls that help protect information both in transit and in situ.  Take a […]
This post is only available to members.

Categories:

Tags:

Comments are closed