Thursday, October 15, 2015

Information Security in Work Place

A workplace is any floor that employees of an organization meet to undertake the respective duties depending on what the employer has given them. This is a critical place for any group as it determines the overall productivity of the employee. Another importance of such a place is that it holds information about the organization and about the activities that it undertakes which might be considered as secrets of the company (Tehan, 2008). It is therefore critical to take into consideration the security of this place so as to ensure that crucial information is never stolen from the organization and hence stand to benefit the competitors. Several measures are taken into consideration so as to make sure the information is safe and these are;

The first should be the regulating of people so as to be certain who enters and leaves the building. Several things can be done so as to make sure this happens and these are several security installations that the organization follows and these are listed below. The first should be to post security guards at the entrance of the building. The guards can be the first line of defense as they can notice any an authorized persons who enter the building and stop them. They can be posted both in front of the main building and also in front of some particular offices. These would likely be the principal positions in the organization where the information is stored.

The second would be the installation of both CCTV cameras and also the metal detecting devices. These together would help to monitor everybody that comes into the building and also those that walk out. This would mean that the system can account for the whole movement of people in the organization and state where they go. The metal detectors would also be of importance as they should help in monitoring what the people walk in with and what they come out with. And suspicious device or item can be checked physically by the guards and make sure that no information is stolen from the organization.

The organization should also provide for an under the counter alarm system. This means that in case of any sign of a dangerous customer, the security team should be able to be alerted within seconds through the system, and so the response should be very immediate and hence reduce the risk of losing the information. The employees should also be briefed on the steps that they should take in case of such situations arises where there is the threat of losing information that is delicate to the organization (Roblin, 2012). This would help in avoiding fracas because this is what criminals use to have an upper hand. It is, therefore, important that there are steps that can be followed during an emergency so as to assure every one of their security.

System clearance is the other item. In most cases, organizations store their information in computers, and this means that for one to access the information they need to have access to the computers. This is where the security clearance comes in. Different employees should be given different security clearance depending on how trustworthy they are in character. This means that not all the employees should have the access to all the information. Depending on the rank of the person, different employees should have different clearances to the access of the system hence making sure that only a few at the top can be trusted with the information.

The computers should also have passwords and other security features that need to be bypassed before the person reaches the final information. Other features may include the fingerprint identification and other biometric measures. These characteristics are even more efficient because they can detect the particular person accessing the information in real time. There should also be alerts that are in place so that to inform other people in case the information is obtained. Coding is the last security measure that can be used so as to make sure that even if the information is obtained, they need an extra effort so as to understand it and this means it may not be useful to the thief after all.  

References: 
1. Collins, M. (2014). Network security through data analysis: Building situational awareness, 1 million log records at a time.

No comments:

Post a Comment