Close

The Mile2 website will be down for scheduled maintenance on Sunday, November 20th starting at 3:00 PM EST (15:00 hrs).

OCU Security Principles Chapter 1

Viewing 2 reply threads
  • Author
    Posts
    • #60767
      Jessica Jagerson
      Keymaster

      Discuss some critical policies needed to ensure a strong security program.

    • #63769
      Cameron collins
      Participant

      I made a list of ways to have a successful security policy

      Identify your risks. What are your risks from inappropriate use.
      Learn from others.
      Make sure the policy conforms to legal requirements.
      Level of security = level of risk.
      Include staff in policy development.
      Train your employees.
      Get it in writing.
      Set clear penalties and enforce them

      • #63796
        [email protected]
        Participant

        Good list of security items. One thing that my company does is regularly (but randomly) sends out phishing type emails from IT to confirm that employees get in the habit of reporting those. What are your thoughts on that?

    • #64292
      Cameron collins
      Participant

      I really think that is a good idea, it keeps them on their toes and shows they are doing what they are suppose to do.

      • #64318
        [email protected]
        Participant

        Yes, it seems to get them into good habits of reporting things that are questionable.

Viewing 2 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email [email protected] .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission