The key theme for protecting IT systems from unauthorised access is to offer multiple layers of protection in terms of people, technology and physical environment.

The key theme for protecting IT systems from unauthorised access is to offer multiple layers of protection in terms of people, technology and physical environment.