By
David Crooke
Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
5. Continuous Improvement. Threats and technologies constantly change, and so do business needs. You should regularly review systems and processes, as well as shut down old systems that no longer are being used. Also, keep software patches up to date — most software breaches exploit weaknesses for which a patch had already been released by a vendor.
0 Comments
View Comments
- Companies:
- Convio Inc.
David Crooke
Author's page
Related Content
Comments