Security arrangements and secutiry policies of enterprises by number of persons employed 2010

  • Dimensions

    • Size
      • Total
      • 100 + employees
      • 10 to 19 employees
      • 1 employee
      • 20 to 49 employees
      • 2 to 9 employees
      • 50 to 99 employees
    • Arrangments/policies
      • Log activities for analyses of security incidents
      • S. polocies for destruction or corruption of data due to an attack or by unexpected incident
      • S. polocies for disclosure of confidential data due to intrusion, pharming, phishing attacks or by accident
      • S. polocies for unavailability of ICT services due to attack from outside
      • Use offsite data backup
      • Use strong password authentication
      • Use user identification and authentication via biometric methods
      • Use user identification and authentication via hardware tokens