1,705
15
Essay, 2 pages (400 words)

How secure is your data, information and information systems technology

There are both similarities and differences in the security issues that you raised when compared to mine. This is because we both touched on password issues but I did not touch on the issue of virus. Reading about your post carefully, I find that it is important for your organization to take the issue of virus very serious as it can easily bring down the entire information system of the company (Chen, Ramamurthy and Wen, 2012). This is because of the differences in threat and harm that viruses pose. As a way of mitigating the risk of virus and their threat, I believe your organization must be very emphatic on the use of cloud backup systems. This will ensure that in cases where virus wipe out important information, there can still be a source of reference (Martucci and& Oldvader, 2010). In my own organization, I believe upgrading our antivirus system as exists in your organization will do us a lot of good.
References
Chen, Y., Ramamurthy, K. K., & Wen, K. (2012). Organizations’ Information Security Policy
Compliance: Stick or Carrot Approach?. Journal Of Management Information Systems,
29(3), 157-188.
Martucci, W. C., & Oldvader, J. K. (2010). Workplace privacy and data security. Employment
Relations Today, 37(2), 59–66. Retrieved from the Walden Library databases
The issue of insider threat is something that we both touched on as part of the trends in security issues. I however did not mention the case of employee negligence. I believe that from the elaboration that you give about employee negligence and how it applies to your organization, having much emphasis on employee training will be a solution to the problem that you currently face. This is because through training, most of the cases of negligence can be dealt with as employees will gain the needed experience to handle all forms of security system cases (Vance, Lowry and Eggett, 2013). In my own organization, I am going to take a lot of inspiration from your organization on the use of specific employee based rules to ensure that all forms of insider breaches are dealt away with (Regions Intranet, 2013).
References
Regions Intranet. (2013). Data Breach. Retrieved from lifeatregions. Accessed April 11, 2014 from http://lifeatregions. rgbk. com/RiskManagement/Compliance/DataBreach. rf
Vance, A., Lowry, P., & Eggett, D. (2013). Using Accountability to Reduce Access Policy
Violations in Information Systems. Journal Of Management Information Systems, 29(4),
263-290. doi: 10. 2753/MIS0742-1222290410

Thank's for Your Vote!
How secure is your data, information and information systems technology. Page 1
How secure is your data, information and information systems technology. Page 2
How secure is your data, information and information systems technology. Page 3

This work, titled "How secure is your data, information and information systems technology" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'How secure is your data, information and information systems technology'. 22 December.

Reference

AssignBuster. (2021, December 22). How secure is your data, information and information systems technology. Retrieved from https://assignbuster.com/how-secure-is-your-data-information-and-information-systems-technology/

References

AssignBuster. 2021. "How secure is your data, information and information systems technology." December 22, 2021. https://assignbuster.com/how-secure-is-your-data-information-and-information-systems-technology/.

1. AssignBuster. "How secure is your data, information and information systems technology." December 22, 2021. https://assignbuster.com/how-secure-is-your-data-information-and-information-systems-technology/.


Bibliography


AssignBuster. "How secure is your data, information and information systems technology." December 22, 2021. https://assignbuster.com/how-secure-is-your-data-information-and-information-systems-technology/.

Work Cited

"How secure is your data, information and information systems technology." AssignBuster, 22 Dec. 2021, assignbuster.com/how-secure-is-your-data-information-and-information-systems-technology/.

Get in Touch

Please, let us know if you have any ideas on improving How secure is your data, information and information systems technology, or our service. We will be happy to hear what you think: [email protected]