The Importance Of Security And Information Systems Security In The Workplace

Decent Essays
Information systems security has become a primary concern for organizations, considering that there are various threats that can emerge in the workplace. This is why it is paramount for businesses to recognize the possible threats in order to be better prepared when encountering a security breach. The first threat that could transpire in the workplace is human error. According to Kroenke (2014) human error entails “accidental problems caused by both employees and nonemployees.” To illustrate, an employee working on an assembly line that forgets to stop the machine, is a prime example of human error. In addition to the aforestated attribute, inadequately written application programs, and poorly drafted procedures as well as somatic calamities …show more content…
Therefore, it is vital that organizations take precautions when navigating through the virtual realm. This is one of the primary reasons technical and data safeguards are beneficial to an organization’s security. In reference to technical safeguards, firewalls, malware protection, and encryption can aid in shielding a company from security threats. Specifically, firewalls avert unwarranted network access, malware protection encompasses spyware, adware, viruses, worms, and Trojan horses, and encryption converts concise text into incomprehensible text for secure storage or correspondence. Data safeguards, however, encompass passwords, backup and recovery, and physical security. In compliance with Schaffer (2006), companies should develop passwords that are complex to reduce its network systems of becoming a botnet force. Accordingly, backup and recovery refers to creating replicas of database contents and physical security implies that the entirety of data should be located in a locked and monitored facility to prevent theft. In addition to technical and data safeguards, human safeguards can also assist a company in protecting the company’s assets. This includes hiring, training, and educating one’s faculty and staff to foster security policy literacy. In closing, the main objective of IS security is to find a happy …show more content…
Not only does it play a major role in regards to whether or not a company’s information is safe, but it can save the company a substantial amount of money in the long-run. However, if employees fail to exercise the organization’s policies, the security procedures will serve no purpose. Thus, employees should practice the succeeding procedures to help the company accomplish its mission. First, view security as a serious matter (Dowd, & McHenry. 1998). Some employees disregard security measures which can perpetuate losses for the organization. Next, formulate passwords that are difficult for attackers to guess. This indicates that one’s name or favorite color should not be used when creating a password and various passwords should be utilized to eliminate the possibility of being hacked. Additionally, never send sensitive or valuable data by email or instant message. This is especially important due to the fact that attackers know where the information is located and how to retrieve it and therefore know how to profit from it (Ianelli, n.d.). Last, when searching the web, only use credible sites that are https or http. In essence, it is not solely the organization’s responsibility when maintaining security threats. By adopting the aforementioned security safeguards, employees can help the company protect its

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The basic protection of data depends on update the anti-malware protection, firewall, and encryption. Creating some security awareness programs. All the people should maintain the data confidentiality and data integrity. In each organization…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    Security systems both physical and virtual are utilized to safeguard information from being copied, stolen, or destroyed. This is complicated by the fact that cyber-attacks can originate from hundreds of miles away and the source can be complicated to determine (Kemp 2012, p. 33). This leads to more robust security systems and multiple layers of duplicated…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Annotated Bibliography: Mobile Telecommunications in the U.S. Kenny Anyikude March 16, 2017 Bowie State University In the area of mobile telecommunications, I’ve discovered growth trends, which will have an impact on the development of the telecommunications industry. These trends will impact the present and future development of mobile telecommunications. Security threats have become a growing trend; cybercriminals have evolved into new and dangerous forms to stay relevant (Olavsrud, 2015). Another trend I have come across is power line networking, which is wired network with hidden wires (Evans, 2014).…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The four most vital pieces of information for an identity thief is an individual’s name, home address, social security number, a bank account number. A thief may not be able to obtain all four pieces, but other personal information such as a date of birth may be stolen instead. In today’s contemporary society, there are three main forms of identity theft. The first and also most common form of theft is an individual’s financial identity. This form of identity theft is most widely known because the reason for stealing such information is to purchase items at the expense of the victim.…

    • 1064 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays