Sunday, October 11, 2015

Business Security Risks & Information Security Strategy - 2

Additionally, a company should educate employees through seminars to avoid cluelessness and careless that may prove costly. Ultimately, updating of the technological endowment at the disposal of a company could also be used as a fight back mechanism. For instance, the discontinuation of rolling out updates for Windows Server 2003 by Microsoft could expose a company to more risks with its continued use (Schiff, 2015). Therefore, such a company should upgrade its server to a more recent one to avoid exposure to probable cybersecurity attacks.
Business security is a prime concern for both small and large corporations that demands a concrete information security strategy. As such, an information security strategy refers to a plan devised by a company in accordance with legal, contractual, internally-developed and statutory requirements (Fey, Kenyon, Reardon, Rogers, & Ross, 2012). Essentially such a strategy should be devised in line with the goals and mission of a company to ascertain its success when it comes to implementation. With this in mind, such a plan is successfully built through commencement with the identification of control objectives for the plan. Once this is done, approaches to meet such objectives are identified and assessed against established metrics and benchmarks. Finally, implementation together with testing plans are laid out (Fey, Kenyon, Reardon, Rogers, & Ross, 2012).
Information security strategies, therefore, quintessentially provide a business with the apt strategies to ensure that the information and data in the hands of its employees is not exposed to possible compromising situations. Implementation of such strategies is also aimed at ensuring that a company is able to fight back in the event of some sensitive information or data leaking out. Conclusively, it is a strategy that serves to fortify the information and data security of a business from cyber attacks, disgruntled employees and exposure of such information by clueless and careless employees.

  
References:
1.      Fey, M., Kenyon, B., Reardon, K., Rogers, B., & Ross, C. (2012). Developing a Security Strategy- an excerpt from Security Battleground. Retrieved from Security Battleground: www.mcafee.com/us/resources/misc/developing-security-strategy.pdf.

2.      Schiff, J. L. (2015, Jan 20). 6 Biggest Business Security Risks and How You Can Fight Back. Retrieved from CIO: http://www.cio.com/article/2872517/data-breach/6-biggest-business-security-risks-and-how-you-can-fight-back.html

No comments:

Post a Comment