A good security policy is the first step to preventing network threats.

  • Non-existent or casually enforced security policies are a major weakness.
  • A security policy must be enforced to prevent compromise or unauthorized use of a network resource.
  • Bad passwords, incorrect permissions, and misconfigured equipment constitute serious weaknesses to a network's security.
  • Complex software with millions of lines of code is vulnerable to hackers.