pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: IT INDUCTION AND INFORMATION SECURITY AWARENESS: A POCKET GUIDE
By: Valerie Maddock, IT Governance Publishing (Editor)
Format: Paperback

List price: £9.95


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 1849280339
ISBN 13: 9781849280334
Publisher: IT GOVERNANCE PUBLISHING
Pub. date: 4 February, 2010
Pages: 54
Description: A pocket guide that puts forward the case for an organisation-wide, and fully supported IT Induction and Information Security Awareness Programme. It intends to provide clarity of purpose, equate the programme to organisational roles and offer practical assistance in the development and delivery of an IT Induction programme.
Synopsis: If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological, failings. However, the human factor usually receives far less attention. Training Computer systems are complex, so people who work with them often need to be trained in how to use them correctly. This applies especially to your company s information security. The loss of a memory stick by a careless employee, or the downloading of a file that contains a virus, may be all it takes to cause a security breach. Practical advice This book offers you practical advice on how to develop an IT Induction programme for your staff that can help safeguard your business information. By providing your employees with simple instruction in good IT working practices, and by making sure they know what is expected of them, you can strengthen your company s information security and reduce the risk that your data will be stolen or lost.A sense of responsibility Encouraging good corporate working and a strong sense of responsibility are, the author argues, essential for the protection of your business information. She shows you how to strike the right balance in your approach to staff training, thereby enabling you to provide your employees with an IT Induction that is at once informative and accessible. Benefits to business include: * Reduce the likelihood of a damaging security breach. Putting in place a programme of IT Induction will help ensure that your company s staff are following information security best practice. Educating employees in good IT working practices will help them to avoid the errors that might otherwise put your organisation at risk. * Protect the company s reputation. The damage an information security breach can do to your business goes beyond the initial cost of clearing up the mess. Without proper staff training, the danger is that theft or loss of data will damage your company s reputation. You need to provide your staff with a proper IT Induction in order to preserve good relations with your customers. * Avoid legal complications.IT offers business new, less formal means of communication. Employees write e-mails in a different style from the way they write letters. However, contracts can be made or broken via e-mail, and e-mail correspondence can be cited in litigation. An IT Induction programme will give your staff the appropriate guidance on e-mail communication with the clients or business partners of your company. * Manage employee working practices. Laptop computers and broadband mean that for many employees, the boundaries between work and home are becoming blurred. If you allow your staff to mix and match between working in the office and working from home, you need to make sure they know what they have to do to safeguard your firm s data both inside and outside the office.
Illustrations: Illustrations
Publication: UK
Imprint: IT Governance Publishing
Returns: Non-returnable
Some other items by this author:
21ST CENTURY CHINESE CYBERWARFARE (HB)
30 KEY QUESTIONS THAT UNLOCK MANAGEMENT (PB)
50 TOP IT PROJECT MANAGEMENT CHALLENGES (PB)
A GUIDE TO EFFECTIVE INTERNAL MANAGEMENT SYSTEM AUDITS (PB)
A MANAGER'S GUIDE TO ISO22301 (PB)
AGILE (PB)
AGILE GOVERNANCE AND AUDIT (PB)
AGILE PRODUCTIVITY UNLEASHED (PB)
AGILE SAP (PB)
AN INTRODUCTION TO ANTI-BRIBERY MANAGEMENT SYSTEMS (PB)
AN INTRODUCTION TO INFORMATION SECURITY AND ISO 27001 (PB)
ASSESSING IT PROJECTS TO ENSURE SUCCESSFUL OUTCOMES (PB)
AVAILABILITY AND CAPACITY MANAGEMENT IN THE CLOUD (PB)
BREAKING THE ADDICTION TO PROCESS (PB)
BUILD A SECURITY CULTURE (PB)
BUSINESS CONTINUITY AND THE PANDEMIC THREAT (PB)
BUSINESS CONTINUITY MANAGEMENT (PB)
BUSINESS MANAGEMENT CONTROLS (PB)
CHANGING THE IT LEADER'S MINDSET (PB)
CLOUD SECURITY AND GOVERNANCE (PB)
COMPLIANCE BY DESIGN (PB)
COMPUTER FORENSICS (PB)
COPING WITH UNPLANNED ABSENCES (PB)
CRITICAL ISSUES SERIES - CYBER SECURITY (PB)
CYBER RISKS FOR BUSINESS PROFESSIONALS (PB)
CYBERWAR, CYBERTERROR, CYBERCRIME (PB)
DATA PROTECTION AND THE CLOUD (PB)
DATA PROTECTION COMPLIANCE IN THE UK (PB)
DIRECTING THE AGILE ORGANIZATION (PB)
DISASTER RECOVERY AND BUSINESS CONTINUITY (PB)
E-MAIL SECURITY (PB)
ESSENTIAL TIME MANAGEMENT AND ORGANISATION (PB)
EU GDPR & EU-US PRIVACY SHIELD (PB)
EU GDPR (PB)
EU GENERAL DATA PROTECTION REGULATION (GDPR) (PB)
EVERYTHING YOU WANT TO KNOW ABOUT AGILE (PB)
EVERYTHING YOU WANT TO KNOW ABOUT BUSINESS CONTINUITY (PB)
EVERYTHING YOU WANT TO KNOW ABOUT ORGANISATIONAL CHANGE (PB)
EXPLODING THE MYTHS SURROUNDING ISO9000 (PB)
FUNDAMENTALS OF INFORMATION RISK MANAGEMENT AUDITING (PB)
GOVERNANCE AND INTERNAL CONTROLS FOR CUTTING EDGE IT (PB)
GOVERNANCE OF ENTERPRISE IT BASED ON COBIT 5 (PB)
GREEN IT IN PRACTICE (PB)
HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY (PB)
ILLUSTRATING PRINCE2 PROJECT MANAGEMENT IN REAL TERMS (PB)
IMPLEMENTIERUNG VON SERVICE-QUALITA BASIEREND AUF ISO/IEC 20000
IMPLEMENTING SERVICE QUALITY BASED ON ISO/IEC 20000 (PB)
IN HINDSIGHT (PB)
INFORMATION SECURITY A PRACTICAL GUIDE (PB)
INFORMATION SECURITY BREACHES (PB)
INFORMATION SECURITY RISK MANAGEMENT FOR ISO 27001/ISO27002 (PB)
INTEGRATED MEASUREMENT - KPIS AND METRICS FOR ITSM (PB)
ISO 19770 SOFTWARE ASSET MANAGEMENT (PB)
ISO/IEC 20000 (PB)
ISO14001 STEP BY STEP (PB)
ISO22301: A POCKET GUIDE (PB)
ISO27000 AND INFORMATION SECURITY (PB)
ISO27001 ASSESSMENT WITHOUT TEARS (PB)
ISO27001/ISO27002 (PB)
IT ASSET MANAGEMENT (PB)
IT GOVERNANCE TO DRIVE HIGH PERFORMANCE (PB)
IT INDUCTION AND INFORMATION SECURITY AWARENESS
IT PROJECT MANAGEMENT (PB)
IT STRATEGIC AND OPERATIONAL CONTROLS (PB)
IT'S ALL ABOUT RELATIONSHIPS
ITIL AND ORGANIZATIONAL CHANGE (PB)
ITIL FOUNDATION ESSENTIALS (PB)
ITIL LIFECYCLE ESSENTIALS (PB)
MANAGING BUSINESS TRANSFORMATION (PB)
MANAGING INFORMATION SECURITY BREACHES (PB)
MEASURING YOUR IT (PB)
NINE STEPS TO SUCCESS: AN ISO 27001 IMPLEMENTATION OVERVIEW (PB)
OHSAS 18001 STEP BY STEP (PB)
ONCE MORE UNTO THE BREACH: MANAGING INFORMATION SECURITY IN AN UNCERTAIN WORLD (PB)
PCI DSS (PB)
PCI DSS A PRACTICAL GUIDE TO IMPLEMENTING AND MAINTAINING COMPLIANCE (PB)
PENETRATION TESTING (PB)
PRAGMATIC APPLICATION OF SERVICE MANAGEMENT (PB)
PROJECT GOVERNANCE (PB)
RELEASE AND DEPLOYMENT (PB)
RESILIENT THINKING (PB)
REVIEWING IT IN DUE DILIGENCE (PB)
SECURING CLOUD SERVICES (PB)
SECURITY (PB)
SELECTION MANAGEMENT FOR SYSTEMS AND SERVICES (PB)
SELLING INFORMATION SECURITY TO THE BOARD (PB)
SERVICE LEVEL AGREEMENTS (PB)
SHAREPOINT GOVERNANCE TOOLKIT (CD)
SOCIALMEDIA TOOLKIT (CD)
SOFTWARE LIFE CYCLE MANAGEMENT STANDARDS (PB)
SWANSON ON INTERNAL AUDITING (PB)
TEN STEPS TO ITSM SUCCESS (PB)
THE CASE FOR ISO 27001 (PB)
THE CHIEF INFORMATION SECURITY OFFICER (PB)
THE CONCISE PRINCE2 (PB)
THE DEFINITIVE GUIDE TO IT SERVICE METRICS (PB)
THE ITSM IRON TRIANGLE (PB)
THE POWER OF THE AGILE BUSINESS ANALYST (PB)
THE PSYCHOLOGY OF INFORMATION SECURITY (PB)
THE QUANTUM AGE OF IT (PB)
THE SECURITY CONSULTANT'S HANDBOOK (PB)
THE TAO OF OPEN SOURCE INTELLIGENCE (PB)
THE TRUE COST OF INFORMATION SECURITY BREACHES AND CYBER CRIME (PB)
TURNING HEADS AND CHANGING MINDS (PB)
TWO-FACTOR AUTHENTICATION (PB)
VALIDATING YOUR BUSINESS CONTINUITY PLAN (PB)
WEB APPLICATION SECURITY IS A STACK (PB)

TOP SELLERS IN THIS CATEGORY
OCR AS and A Level Computer Science (Paperback)
PG Online Limited
Our Price : £32.30
more details
BTEC First in I&CT Revision Workbook (Paperback)
By:
Pearson Education Limited
Our Price : £5.54
more details
Algorithms to Live By (Paperback)
HarperCollins Publishers
Our Price : £8.02
more details
User Story Mapping (Paperback)
O'Reilly Media, Inc, USA
Our Price : £23.35
more details
BTEC First in I&CT (Paperback)
By:
Pearson Education Limited
Our Price : £5.54
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 general theory of computing


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket