The three pillars of cyber security protection which are identity, privilege and asset management – won’t ever lose importance. They have remained inalterable for the past few decades. However, other IT security suggestions have not been as deep seated, and have instead evolved to reflect changes in the threat landscape, the onset of new technology tools, or updated insights based on better data.

But not everything new is shiny and not everything old is broken. So, which recent security policies should you and your employees give up? And how do you get a workforce to unlearn habits which they may have just spent time learning? Read more..