Describes information security risks and threats and provides tools for protecting information assets. The text leads the reader through the process of developing and implementing an information security plan, both for their own practices and for their clients.