ISM (Information Security Management) Tips For SMEs – Byte 5
Related Document -
PDF file.
Generate QR Code
In our fifth byte, we will further break down the
second policy statement a basic ISM policy should
include – access control. We will also discuss what
implementing this policy statement entails and tips
for doing so within an SME environment with limited
time and resources.