Laserfiche WebLink
<br />CyberCrime & Information Security <br /> <br />Application Protection <br /> <br />. Application~based access controls <br />..,.. Authorize running 01 application features at <br />user level <br />..,. Urnit who eRn create, modify. delete, publish <br /> <br />. Encryption of application data files <br /> <br />Data Protection <br /> <br />. Back up all data <br />... Regular schedule <br />- Offsite storage . <br />... Test backups regularly _ ~:O' <br /> <br />~ he. /L.U "n.d <br />'11- ~!7~! <br /> <br />Processes <br />Setting up a Security Plan <br /> <br />. Conduct a Risk Assessment <br />. Plan for the worst: Have process in <br />place to nanGIe security breaches <br />. Create policies J <br /> <br />.; Wi l,{YlC <br /> <br />2002lMC Annual Conference <br />Barbara GallolBrian Still <br /> <br />. <br /> <br />r, <br /> <br />10 <br />