Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.
What type of compliancy standard, regulation or legislation provides a code of practice for information security?
A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis.
What is a qualitative risk analysis?