IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The video player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, 720p, 1080p, Other


 
This video file can be linked to by copying the following URL:


 
Download the video file. There is also an HD version of this video.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. At Intel, we are working to make employees aware of safe computing practices both at work and at home. These practices include a secure development lifecycle for products, services, and data. Check out this video to see what questions we are asking. Maybe you’ll see some that spark some ideas that can help protect your people, organization and brand.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , , , ,
 
Posted in: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast
 


 


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.

 

Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.