MIT University , Skopje , North Macedonia
MIT University , Skopje , North Macedonia
How to obtain adequate data security? How to implement software tools that prevent data leakage? How to monitor data in the cloud to safeguard data at rest, in use, and in motion? How to satisfy the regulatory demands to be in compliance? We performed research that presents activities and skills to answer these questions. Implementation of a policy using best
practices is the appropriate solution for data security prevention. We present the main concepts that this policy should contain, which are involving leadership, education of workforce, identification of data that requires protection, identifies all stakeholders and use metrics to determine the success.
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.