The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully.


Get Social with TBU

Follow The Behaviour University in order to get the greatest quotes from the greatest people of all time so that you can tap into your own greatness.

Follow Us:

The Behaviour University ©