Shockingly, there were several organizations that admitted that they omit their privacy policies and procedures from their internal website. Many organizations reported that they assess and/or monitor their employees to ensure they are in compliance with information security policy standards. A very small percentage of the surveyed respondents said that they recorded who they used as a third party vendor who could access their data. This could be problematic for companies that are too cheap and lazy, so to prevent this, they must ensure that both companies are using security and privacy procedures. High priority initiatives for companies in the future are to hire top executives and subject matter experts for their information security areas, invest in security protection technologies, and conduct trial and error tactics to see what works best on security issues that may
Shockingly, there were several organizations that admitted that they omit their privacy policies and procedures from their internal website. Many organizations reported that they assess and/or monitor their employees to ensure they are in compliance with information security policy standards. A very small percentage of the surveyed respondents said that they recorded who they used as a third party vendor who could access their data. This could be problematic for companies that are too cheap and lazy, so to prevent this, they must ensure that both companies are using security and privacy procedures. High priority initiatives for companies in the future are to hire top executives and subject matter experts for their information security areas, invest in security protection technologies, and conduct trial and error tactics to see what works best on security issues that may