Defining Access Control Policies

Access Control comes in many different flavours depending on the business, the systems used, and the buildings protected. At the same time, access control has a generic theme. Consequently, the policies put in place will be similar across the board, even when specific implementations of access controls can be very different. Sections of an Access […]

Read more

Consequences of inadequate IT governance

Governance of Information Technology is essential to adequately direct and control the current and future use of technology within businesses and to ensure compliance with contractual, legislative and regulatory obligations. Failure to do so is highly likely to expose companies to one or more violations which could result in: Regulatory sanctions Criminal prosecution Loss of […]

Read more