IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The video player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, 720p, 1080p, Other


 
This video file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the video file. There is also an HD version of this video.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. At Intel, we are working to make employees aware of safe computing practices both at work and at home. These practices include a secure development lifecycle for products, services, and data. Check out this video to see what questions we are asking. Maybe you’ll see some that spark some ideas that can help protect your people, organization and brand.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , , , ,
 
Posted in: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast