By
David Crooke
Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
4. Defense in Depth. Processes, technology and people all are imperfect, and a system is only as secure as its weakest link. Don’t rely on a single layer of protection for important information. Your donor database server should be in a locked room, protected by an additional onboard firewall and password-controlled access.
0 Comments
View Comments
- Companies:
- Convio Inc.
David Crooke
Author's page
Related Content
Comments