Mile2 Cybersecurity Certifications

Reply To: OCU C)SP D Week 04 Lesson 08 Discussion

#110667
Trae Johnson
Participant

This response clearly and in great detail explains why access controls are essential to the security stance of a business. I like how you broke down the concept into everyday language and explained how such policies control who has access to view or modify specific information. Your examples, such as demanding strong passwords, locking up computers, and using two-step verification, show effective ways businesses can apply these principles in everyday life. I also appreciate your mention of personal responsibility because the success or failure of a security policy is most often the result of human action. Referring both to hackers and system error, you showed respect for the entire spectrum of why access controls are necessary. Your response demonstrates how carefully crafted policies and constant user education work together to secure data and maintain trust in an organization.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.