Security threats explained: Hacktivism

25.06.2012

Once the security policies were in place, the implementation of integrated security products that map back to the policies was essential to reducing the risk of threats.

"All of these elements must be in sync and working together to give organisations a much greater chance of minimising threats," Burns says.

Follow Hamish Barwick on Twitter: @HamishBarwick

Follow Computerworld Australia on Twitter: @ComputerworldAU