Plan for robust security to meet the specific needs of different scenarios.
Consider the situations that your people might face when they are working away from the office. Will they be working at home?
Whether your organisation is hosting or attending events, you must assess physical security and safety risks and put measures in place to reduce them.
ICT systems are especially vulnerable to attack and misuse of information stored on them, so they require particular care.
To protect sensitive items, follow the four stages of secure transportation. The tasks for securely transporting sensitive items fall into four broad stages: assessing the risks planning security before you move the item managing security during the move confirming the item has arrived safely and wrapping up the transport process.