
This post was originally published by (ISC)² Management.
As a security practitioner, how often have you heard the refrain from your colleagues that one of the security protocols that were so carefully thought-out and expertly implemented are just too difficult to deal with? Perhaps you have sighed when you had to adhere to your own security protocol? As a security evangelist, you understand the necessity of adhering to a set of security requirements, but as a normal staff member, you can understand the frustration of your non-security coworkers.
Read more here:https://blog.isc2.org/isc2_blog/2021/04/the-delicate-balance-of-security-versus-usability.html
Photo:www.securitymagazine.com
Ad
Join over 500,000 cybersecurity professionals in our LinkedIn group "Information Security Community"!