Presents an article condensed from the June 1972 issue of the journal 'Computer Decisions,' about computer security for companies. Inclusion of the need for data processing managers to ensure that access to the computer system is controlled; Incorporation of security profiles with various levels of classification of users; Use of threat monitoring to thwart users who have obtained passwords illegally.