The traditional “triple A’s” of access security, Authentication, Authorization, and Accounting, have been joined by a newcomer – Auditing. Like its predecessors, auditing is most effective when enforced, rather than being voluntary.
Mobile technology has arrived.
Over the past few years, Information Security has emerged as a separate and distinct profession from traditional systems and physical security career fields.
Traditionally many organisations were of the opinion that security breaches were something that only affected ‘other’ companies and would never happen to them.