Sunday, October 11, 2015

Business Security Risks & Information Security Strategy - 1

With technological advancement comes myriad risks that business, small and big alike, have to combat and come up with efficacious mitigation maneuvers. Technological advancements, therefore, culminate in imminent cybersecurity risks that companies constantly struggle to deal with. Nonetheless, cybersecurity is a general term that refers to a whole wide range of probable risks that entail attack to a company’s data and data bases through the internet. Thence, companies face such main security risks as internal attacks from disgruntled employees, uninformed or careless employees and ultimately use of mobile devices and obsolete technology to access company data and information (Schiff, 2015).
                 To begin with, contemporary society heavily relies on technology for the implementation of various tasks. Companies alike also rely on various technological inputs for the transmittance of data, conveyance of information and undertaking of various other business activities. Therefore, to deal with the above mentioned risks especially from former IT employees with access to admin accounts and company networks, it is crucial that a company enacts a policy of password changes every time an employee is let go (Schiff, 2015). Additionally, updating of company security level inputs through such measures as implementation of stronger passwords and encouragement of secrecy at a company could also be used as a mitigation approach. To combat the use mobile devices to convey sensitive company information, a company should ensure that a BYOD policy is enacted spelling out the use of mobile devices at work (Schiff, 2015).

To be Continued in Second Part in Next Week....

References:
Fey, M., Kenyon, B., Reardon, K., Rogers, B., & Ross, C. (2012). Developing a Security Strategy- an excerpt from Security Battleground. Retrieved from Security Battleground: www.mcafee.com/us/resources/misc/developing-security-strategy.pdf

No comments:

Post a Comment