Computer forensics: incident response essentials
Computer forensics: incident response essentials
Information Security Policies Made Easy: Version 6 (Includes CD-Rom)
Information Security Policies Made Easy: Version 6 (Includes CD-Rom)
Microsoft Windows Security inside out for Windows XP and Windows 2000
Microsoft Windows Security inside out for Windows XP and Windows 2000
The critical elements of patch management
Proceedings of the 33rd annual ACM SIGUCCS conference on User services
Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries
The critical elements of the patch management process
Communications of the ACM - A Blind Person's Interaction with Technology
A specification language for information security policies
CIS'09 Proceedings of the international conference on Computational and information science 2009
Hi-index | 0.00 |
Employees are the greatest threat to an organization's security. Their non-compliance with security policies not only threatens the integrity of the system, it also costs the organization a significant amount of money due to the loss of information or the man-hours spent fixing problems that the user causes. This paper looks at the man-hour cost due to non-compliance at a branch of a large university. We identified what constituted non-compliance and then had the IT staff track the number of hours they spent addressing these problems over a 13-month period. This paper also covers what actions and tools the IT department is using to combat the problem of user non-compliance.