Should information security safeguards be assigned to individuals based on their risky behavior? Lenny Zeltser discusses the possibility in this blog post.
Disclaimer: The link to this content is provided because it has information that may be useful. NYSTEC does not warrant the accuracy of any information contained in the link and neither endorses nor intends to promote the advertising of the resources listed therein. The opinions and statements contained in such resources are those of the author and do not necessarily represent the opinions of NYSTEC.