Have policies addressing background checks for employees to be used as part of an attack happens.Have documented policies and processes at least annually according.Have policies and procedures for reporting compromises.Get all data HERE Categories: ArticlesTags: Data security