Red Tape


The Importance of a Security, Education, Training and Awareness program

Contributed by Stephanie D. Hight

A Security Education, Training and Awareness (SETA) program can be defined as an educational program that is designed to reduce the number of security breaches that occur through a lack of employee security awareness. A SETA program sets the security tone for the employees of an organization, especially if it is made part of the employee orientation. Awareness programs explain the employee’s role in the area of Information Security. The aim of a security awareness effort is participation. Technology alone cannot solve a problem that is controlled by individuals.

This document is in PDF format. To view it click here.


How to Implement an Information Security Program

Contributed by Charles Hornat

This write-up is about my approach to Information Security and based on my own experiences. There are a number of ways to implement a program, but I believe that one has to first identify what they are protecting, understand the risks and associated threats, and then formulate a plan of protection.

This document is in PDF format. To view it click here.


Security Program Elements of Adoption

Contributed by Robert Underwood

With the risk of losing information to an unwanted entity the process of securing information is at high level priority to businesses. Although there are many models and frameworks that can be applied if the culture does not accept or adopt the methodologies then the effort is in vain and the investment is lost. Understanding the culture within a business and applying the appropriate adoption methodology is the best chance for implementation success.

Understanding the culture and how to integrate new processes through training techniques geared to individual employees which provides a platform for successful adoption.

This document is in PDF format. To view it click here.


The Future of Net Neutrality and the Federal Communications Commission

Contributed by Michael Haythorn


Information Security in the Workplace - The Employee's Role

Contributed by Corey Pachniak

While at work we believe that our co-workers are all trust worthy. While much emphasis is placed on the virtual security of that information, firms often overlook the physical opportunities provided by daily common tasks. This paper will demonstrate that during work hours an individual has several opportunities to inadvertently reveal critical information about themselves or about their organization. Most major firms provide avenues to communicate critical information securely, but due to the activities that inherently distract all of us, those securities are over looked. The intentions of the author is to provide several examples of daily oversights. The potential risks of the release as a result of those oversights will be discussed. Finally, this paper will provide simple methods to control the release of information, and how to address situation in which to handle unexpected releases of information.


Subscribe to RSS - Red Tape