Grant McGregor Blog
Posts about

Information Security System Audit

Your IT perimeter: where is it and how do you best defend it?

Your IT perimeter: where is it and how do you best defend it?

Gone are the days when the limits of your security cordon were the walls of the datacentre.  Now, it isn’t the stray floppy disk or errant memory stick we need to worry about – many of us are wondering where the limits of our IT perimeter are.

Read More

Categories

see all