Saturday, March 25, 2006
E-Mail Security Supports Sarbanes-Oxley
If you can't produce e-mail messages you think might be damaging, think again. Their absence might be worse.
Sound practices include corporate-wide information security policies and enforced implementation of those policies for employees at all levels. Information security policies should govern network security, access controls, authentication, encryption, logging, monitoring and alerting, pre-planned coordinated incident response, and forensics. These components allow for information integrity and data retention, while enabling IT audits and business continuity.
See full Article.