Therefore, it is vital that organizations take precautions when navigating through the virtual realm. This is one of the primary reasons technical and data safeguards are beneficial to an organization’s security. In reference to technical safeguards, firewalls, malware protection, and encryption can aid in shielding a company from security threats. Specifically, firewalls avert unwarranted network access, malware protection encompasses spyware, adware, viruses, worms, and Trojan horses, and encryption converts concise text into incomprehensible text for secure storage or correspondence. Data safeguards, however, encompass passwords, backup and recovery, and physical security. In compliance with Schaffer (2006), companies should develop passwords that are complex to reduce its network systems of becoming a botnet force. Accordingly, backup and recovery refers to creating replicas of database contents and physical security implies that the entirety of data should be located in a locked and monitored facility to prevent theft. In addition to technical and data safeguards, human safeguards can also assist a company in protecting the company’s assets. This includes hiring, training, and educating one’s faculty and staff to foster security policy literacy. In closing, the main objective of IS security is to find a happy …show more content…
Not only does it play a major role in regards to whether or not a company’s information is safe, but it can save the company a substantial amount of money in the long-run. However, if employees fail to exercise the organization’s policies, the security procedures will serve no purpose. Thus, employees should practice the succeeding procedures to help the company accomplish its mission. First, view security as a serious matter (Dowd, & McHenry. 1998). Some employees disregard security measures which can perpetuate losses for the organization. Next, formulate passwords that are difficult for attackers to guess. This indicates that one’s name or favorite color should not be used when creating a password and various passwords should be utilized to eliminate the possibility of being hacked. Additionally, never send sensitive or valuable data by email or instant message. This is especially important due to the fact that attackers know where the information is located and how to retrieve it and therefore know how to profit from it (Ianelli, n.d.). Last, when searching the web, only use credible sites that are https or http. In essence, it is not solely the organization’s responsibility when maintaining security threats. By adopting the aforementioned security safeguards, employees can help the company protect its