Information security policies are a ___________________.
A.
Necessary evil
B.
Waste of time
C.
Business enabler
D.
Inconvenience for the end user
E.
All of the answers are correct
Information security policies are a ___________________.
Information security policies are a ___________________.
A.
Necessary evil
B.
Waste of time
C.
Business enabler
D.
Inconvenience for the end user
E.
All of the answers are correct