ISM (Information Security Management) Tips For SMEs – Byte 5
                    
                    
                
                    
                        Related Document - 
                        PDF file.
                    
                
                 
                
                    
                
                
                    
                        
                            
                        
                        
    In our fifth byte, we will further break down the
second policy statement a basic ISM policy should
include – access control. We will also discuss what
implementing this policy statement entails and tips
for doing so within an SME environment with limited
time and resources.