Lesson Category: Information Security

Information Security Policy

Information Security Policy The information contained in this training is industry best practices.  Your company subscribes to a vast majority of these.  However, your company may have additional requirements …

Data Retention

Data Retention It is often difficult to decide what to keep and what to delete in today’s gigabyte world. We have limits on how much space we have in …

Building Security

Building Security After a Fortune 500 company bought a Prepaid Program Manager, the parent company hired a security hacker to hack their new acquisition. This hacker sat in the …

Software

Software Without software, our computers would be paper weights.  Software enables us to do our jobs.  It also enables hackers and fraudsters to do their jobs.