In this section, we will address information security best practices as they relate to both the server and workstations.
Information security best practices
User accounts
User account management is critically important in a well-managed and secure enterprise information environment. It is important that you develop strong information security policies related to user accounts and their management, and develop mechanisms to audit your information system to ensure that your organization's policies are being followed.
Limit administrator accounts
Not everyone in your...