security policy requirements

Even though we’ve talked about digital security policies in this lesson quite a bit, a lot of users choose to just ignore security policies and many network vulnerability issues can later be traced back to users who don’t follow security policies.  Why do you think users sometimes ignore security policy requirements? Can you think of an example where you came across a situation like that?

APA format for all references is expected – at the very least, your textbook should be listed as a reference for your discussion board posting.