Approaches to security policy

Here are common strategies for security policy, for better or worse. Plug the Holes This approach is used by enterprises and big business – those with a $10,000,000+ budget for their IT department. Enterprises need a full-functioned network.  They need ten different versions of Microsoft servers and desktops, Office, Adobe, Internet Explorer, File sharing, Websites, and …Read More…