||Identity Administration: Network Operators and Service Providers should establish policies governing destruction (shredding, incineration, etc.) of paperwork, disks and other media that hold information a hacker could use to breach security.
||Cable; Wireless; Wireline
||Service Provider; Network Operator
||Cyber Security;Information Protection;Intrusion Detection;Policy;Training and Awareness;
||Source: 2009 Carnegie Mellon University, Author: Mindi McDowell posted on: http://www.us-cert.gov/cas/tips/ST04-014.html