Implementing information security solutions in SMBs

The pros and cons of different approaches to deploying and maintaining information security systems.