1. Why do you believe some companies in the Information Technology industry are able to succeed for a long time, such as IBM, while others aren’t? (Strategies, Environmental factors, etc.) - “The IT industry is all about innovation. Companies need to either innovative, make their products better or they die. Apple is a good example in the industry because they constantly create new products and better products. The moment they stop doing that they die. They were the first to come out with the…
cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness. Information gathered from 38 sources up to this point provided the content…
Information security policy refers to measures taken by a company in an attempt to control the behavior of the labor force. The policy ensures that no inappropriate activities take place within the working environment. As part of the rules that the policy has to abide by is the compliance with the laws and regulation and the ability to create defense in the court (Peltier, 2016). The management must support and administer the policy in a suitable manner. It is imperative to tailor the policy as…
weakness and mostly it is not being seen as a security threat. Protecting and defending a network successfully requires an effective system architecture security. Plus organization, network engineers and administrators must have policies, guidelines and follow through with the vulnerability assessment process. A successful defense will require effective information security architecture with that vulnerability assessment. With the constant advancement in knowledge, programs, and technology…
financial situation. Telemedicine is explained as usage of medical information, and telecommunications exchanged from one site to another for diagnosing, treating, and monitoring a patient’s health status (Wilson & Maeder, 2015). Risks There are regulations that our facility already should adhere to, and they become more prevalent when introducing technology, electronic health records (EHRs), and electronic handling of patient information. The Health Insurance Portability and Accountability Act…
This essay is a reflection on the progress of a career in the Information Technology field with a focus on personal experiences, education and past work. Information Technology has infiltrated our lives in the last 30 years in ways we never thought possible. I grew up in a world where having a landline and one television set per household were considered luxuries. Today, it’s hard to imagine a day without our latest smartphones that provide us access to the latest news, emails, and multimedia…
identification, classification, response, and recovery from an incident. If the incident escalades or is disastrous, then the organization needs to use Disaster Recovery Plan (DRP). This is the most common of all three, since it revolves around restoring systems after the disastrous incident already occurred. DRP is the planning process associated with the preparation for and recovery from a disaster, whether natural or man-made. DRP include preparation for recovery, strategies to limit…
throughout various information security standards and controls; up to and including tracking and managing any corrective actions that may derive from the various audits and assessments. I am an integral member of the team in regards to security program development, vulnerability management, physical security, and documentation development. In an effort to help bridge the gap between security and various business units I participate in various meetings and committees such as our Information…
This honestly has to be one of my favorite memes that came from the year 2015. This type of meme I would classify as a harmless one that had nothing to do with what was going on at the time. Before talking about what makes this picture a meme, I have to explain the different categories of memes. I like to divide them into separate categories: have some meaning and relevance, no meaning at all but some relevance, random picture that became famous. I would categories doge as a random picture that…
we should follow some steps to be secure during use the internet. First of all , always update your system and apps every weeks. Second if you receive message from unknown email which contains link or attach file do not open it , just delete it. Although , some IT company offering service to scanner and analysis file for free, Even if you should to buy to them , I can buy $10 to make sure my system is going to be secure. VirusTotal is the most common site for scanner file and analysis exception…