IT Induction and Information Security Awareness  
Published by IT Governance Publishing
Publication Date:  Available in all formats
ISBN: 9781849281195
Pages: 0

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781849281195 Price: INR 1044.75
Add to cart Buy Now
If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological, failings. However, the human factor usually receives far less attention.   Computer systems are complex, so people who work with them often need to be trained in how to use them correctly. This applies especially to your company’s information security. The loss of a memory stick by a careless employee, or the downloading of a file that contains a virus, may be all it takes to cause a security breach. This book offers you practical advice on how to develop an IT Induction programme for your staff that can help safeguard your business information. By providing your employees with simple instruction in good IT working practices, and by making sure they know what is expected of them, you can strengthen your company’s information security and reduce the risk that your data will be stolen or lost.
Rating
Description
If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological, failings. However, the human factor usually receives far less attention.   Computer systems are complex, so people who work with them often need to be trained in how to use them correctly. This applies especially to your company’s information security. The loss of a memory stick by a careless employee, or the downloading of a file that contains a virus, may be all it takes to cause a security breach. This book offers you practical advice on how to develop an IT Induction programme for your staff that can help safeguard your business information. By providing your employees with simple instruction in good IT working practices, and by making sure they know what is expected of them, you can strengthen your company’s information security and reduce the risk that your data will be stolen or lost.
Table of contents
  • FOREWORD
  • PREFACE
  • ABOUT THE AUTHOR
  • CONTENTS
  • CHAPTER 1: PUTTING IT INDUCTION IN PERSPECTIVE
    • To explain:
    • So what is the relationship between IT Induction and Information Security Awareness?
    • How does an ICT Code of Conduct fit with IT Induction?
  • CHAPTER 2: THE TARGET AUDIENCE
  • CHAPTER 3: WHOSE RESPONSIBILITY IS IT ANYWAY?
    • Question
  • CHAPTER 4: INDICATIVE CONTENT
    • System access
      • The new user will probably want to know:
      • The organisation may also want them to know:
    • System resources
      • Once a new user has gained access to the system they will probably want to know:
      • The organisation may also want them to know:
    • Connectivity
      • A new user may want to know:
      • The organisation may also want them to know:
    • E-mail
      • The new user will probably want to know:
      • The organisation may also want them to know:
    • Web facilities
      • The new user will probably want to know:
      • The organisation may also want them to know:
    • Health and safety
    • IT services
      • The new user will probably want to know:
      • The organisation may also want them to know:
    • Recommended reading
  • CHAPTER 5: DELIVERY OPTIONS
  • CHAPTER 6: MAKING IT INDUCTION PART OF A NEW USER PROCESS
    • Case study
      • And the result?
  • CHAPTER 7: IT INDUCTION – A ONE TIME ONLY EXPERIENCE?
  • ITG RESOURCES
    • Other Websites
    • Pocket Guides
    • Toolkits
    • Best Practice Reports
    • Training and Consultancy
    • Newsletter
User Reviews
Rating