The Importance Of Security And Information Systems Security In The Workplace

Decent Essays
Information systems security has become a primary concern for organizations, considering that there are various threats that can emerge in the workplace. This is why it is paramount for businesses to recognize the possible threats in order to be better prepared when encountering a security breach. The first threat that could transpire in the workplace is human error. According to Kroenke (2014) human error entails “accidental problems caused by both employees and nonemployees.” To illustrate, an employee working on an assembly line that forgets to stop the machine, is a prime example of human error. In addition to the aforestated attribute, inadequately written application programs, and poorly drafted procedures as well as somatic calamities …show more content…
Therefore, it is vital that organizations take precautions when navigating through the virtual realm. This is one of the primary reasons technical and data safeguards are beneficial to an organization’s security. In reference to technical safeguards, firewalls, malware protection, and encryption can aid in shielding a company from security threats. Specifically, firewalls avert unwarranted network access, malware protection encompasses spyware, adware, viruses, worms, and Trojan horses, and encryption converts concise text into incomprehensible text for secure storage or correspondence. Data safeguards, however, encompass passwords, backup and recovery, and physical security. In compliance with Schaffer (2006), companies should develop passwords that are complex to reduce its network systems of becoming a botnet force. Accordingly, backup and recovery refers to creating replicas of database contents and physical security implies that the entirety of data should be located in a locked and monitored facility to prevent theft. In addition to technical and data safeguards, human safeguards can also assist a company in protecting the company’s assets. This includes hiring, training, and educating one’s faculty and staff to foster security policy literacy. In closing, the main objective of IS security is to find a happy …show more content…
Not only does it play a major role in regards to whether or not a company’s information is safe, but it can save the company a substantial amount of money in the long-run. However, if employees fail to exercise the organization’s policies, the security procedures will serve no purpose. Thus, employees should practice the succeeding procedures to help the company accomplish its mission. First, view security as a serious matter (Dowd, & McHenry. 1998). Some employees disregard security measures which can perpetuate losses for the organization. Next, formulate passwords that are difficult for attackers to guess. This indicates that one’s name or favorite color should not be used when creating a password and various passwords should be utilized to eliminate the possibility of being hacked. Additionally, never send sensitive or valuable data by email or instant message. This is especially important due to the fact that attackers know where the information is located and how to retrieve it and therefore know how to profit from it (Ianelli, n.d.). Last, when searching the web, only use credible sites that are https or http. In essence, it is not solely the organization’s responsibility when maintaining security threats. By adopting the aforementioned security safeguards, employees can help the company protect its

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    To adequately protect this information, each member of Walters Security will be required to adopt appropriate steps to manage the security of all private information. This paper will further discuss current…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    2) Do not use cloud based applications to store company information. These services may transfer data to not secure parties. 3) Do not share your data (do not synchronize) with other devices at home or any other places; not even with family and friends. By doing this you are inviting others to your share your network and facilitating the way for intrusions. 4) Throughout work hours, employees must keep to the minimum the usage of private devices for personal motives.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Jacob Dale, the director of IT department of Sunnylake needs to execute network security training in the entire hospital. Training of the staffs is also required because most of them were from traditional background and had little knowledge about IT. Some of the security fundamentals such as never leave the systems unlocked, enforcing well-built password policy, reset password every 45 days, take out admin rights so that the staff cannot set up software, execute policy to block weak sites. When workers focus on their own duties, they regularly don’t give attention to the following ordinary instructions for network security. Employees might accidentally guide to other security susceptibilities, as well as the unforeseen reception and spreading of computer viruses.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Annotated Bibliography: Mobile Telecommunications in the U.S. Kenny Anyikude March 16, 2017 Bowie State University In the area of mobile telecommunications, I’ve discovered growth trends, which will have an impact on the development of the telecommunications industry. These trends will impact the present and future development of mobile telecommunications. Security threats have become a growing trend; cybercriminals have evolved into new and dangerous forms to stay relevant (Olavsrud, 2015). Another trend I have come across is power line networking, which is wired network with hidden wires (Evans, 2014).…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The four most vital pieces of information for an identity thief is an individual’s name, home address, social security number, a bank account number. A thief may not be able to obtain all four pieces, but other personal information such as a date of birth may be stolen instead. In today’s contemporary society, there are three main forms of identity theft. The first and also most common form of theft is an individual’s financial identity. This form of identity theft is most widely known because the reason for stealing such information is to purchase items at the expense of the victim.…

    • 1064 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    - Employees need to store sensitive information, including protected health information (PHI) on protected network servers only. - Employees need to avoid accidental spills by keeping food and drink away from workstations. - Laptops that contain sensitive information need to be secured by using cable locks or by locking them in drawers or cabinets. - Employees need to comply with the Portable Workstation Encryption…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays