Advances in Technology Have Transformed the Way Essay

Download this Essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Essay:

advances in technology have transformed the way that firms are addressing security related issues. This is because most devices have become much smaller and they are often focused on providing users with remote access. As a result, these kinds of platforms are a potential danger to all organizations. ("Guidelines for Securing Mobile Devices," 2012)

Evidence of this can be seen with observations in a report prepared by Stanford University which said, "Mobile computing devices can store large amounts of data, are highly portable and are frequently unprotected: they are easy to steal or lose, and unless precautions are taken, an unauthorized person can gain access to the information stored on them or accessed through them. Even if not stolen or lost, intruders can sometimes gain all the access they need if the device is left alone and unprotected, if data is 'sniffed out of the air' during wireless communications, or if malware is installed. The results can include crippled devices, personal data loss, disclosure of non-public University data, and disciplinary actions for the device owner." These different areas are showing the challenges of shifting platforms. In the future, these issues will become a major threat that must be continually dealt with on a regular basis by all corporations. ("Guidelines for Securing Mobile Devices," 2012)

As a manager, how would you plan on securing organizational data?

In order to address any kind of security issues; requires that an all-encompassing approach is utilized. This will be accomplished by focusing on a number of different areas that will improve the total amounts of protection. These include: conducting regular training, encrypting all data, having back up procedures in place and rotating the SSH regularly. The combination of these factors will work in correlation with each other to address a host of challenges. Once this takes place, is when the firm will be able to adapt and evolve with new threats. This is the point that the underlying risks will be dramatically reduced. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

In the case of conducting regular training, there needs to be an emphasis on understanding the threats facing the company and identifying potential solutions. The best way that this can be achieved is through knowing the environment. This means analyzing the possible weaknesses and threats. Once this happens, is when personnel must create a protocol that will address these challenges. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

After this occurs, is when effective training must be conducted on a regular basis. This will take place at least once per quarter through a series of workshops and practical examinations. This will teach staff members about possible early warning signs of security breaches and how to effectively respond. When this occurs, employees will serve in a role of monitoring and identifying any kind of possible issues. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

It is at this point that the underlying threat can be isolated. Every quarter, this training will be continually updated to reflect new threats and how to deal with them. If this kind of approach is used, it will increase the total number of people monitoring these issues (which will have an impact on the firm's ability to mitigate these challenges). ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

The encryption of all data is when any kind of sensitive information is available only to the end users. For those individuals who are seeing this information over a mobile device, these services are often unavailable. This is because the majority of data is not protected in the same kind of format as a secured network (thanks in part to the cloud applications that are being utilized). To address these kinds of challenges, all firms must have a third party provider that will encrypt all data. This will make it more difficult for hackers to view sensitive information that is being transferred from the server and the mobile device. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

Having back up procedures in place is looking beyond the common solutions that are often utilized by firms. What normally happens is most firms will have some kind of certificate of authority (CA). This is an application that is designed to provide added assurances about the safety…[continue]

Cite This Essay:

"Advances In Technology Have Transformed The Way" (2012, July 22) Retrieved December 11, 2016, from http://www.paperdue.com/essay/advances-in-technology-have-transformed-81201

"Advances In Technology Have Transformed The Way" 22 July 2012. Web.11 December. 2016. <http://www.paperdue.com/essay/advances-in-technology-have-transformed-81201>

"Advances In Technology Have Transformed The Way", 22 July 2012, Accessed.11 December. 2016, http://www.paperdue.com/essay/advances-in-technology-have-transformed-81201

Other Documents Pertaining To This Topic

  • Technology & Globalization the Positive

    Furthermore, Drago argues there are substantial developmental costs when technology is concentrated in the hands of a few, most notably more advanced countries, creating a so called "digital divide" between rich and poor countries. Even in developed countries, increased productivity is eliminating many jobs in manufacturing, transportation and other high-paying industries (Innovations in technology and globalization: Introduction to the information era) and outsourcing is moving these jobs to countries

  • Technology Blessing or Curse

    Technology: Blessing or Curse? Imagine studying machinery that is becoming smaller and smaller every day. What will one discover? This is a hot topic that is on a lot of individuals mind in our society today. People are curious about how it is evolving, and ways to stay current with it. One will discuss whether or not this is a blessing or a curse for technology. According to a recent study by

  • Technology Technological Advances Have Impacted Every Area

    Technology Technological advances have impacted every area of human existence on almost every area of the planet, with few exceptions. Nearly every aspect of daily mundane life is affected by technology, including communication and transportation. However, one area of daily life is even more impacted and transformed than others. That area is food and eating. Food production has changed dramatically since the Industrial Age. Indeed, since the invention of the cotton

  • Information Technology Acts What Were the Advances

    Information Technology Acts What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives.

  • Technology on Personal Relationships the

    In many ways, students live both in the land-based or physical world as well as in the virtual world; leading what some considers parallel lives. Helliwell & Putman (2004) posit that social networking sites may offer an avenue for the development of greater social capital which may serve to further reinforce students' likelihood of integrating Facebook and other social media sites into their regular routines. A suggestion made as to the

  • Technology on Human Resource Management

    Performance and Compensation Management According to Sachdeva, Mittal and Solanki (2009), technological solutions are vitally important for aggregating and using relevant human resource management information for performance and compensation decisions. These authors note that, "Human resource information systems are extremely important for acquiring, maintaining, utilizing and deriving human resources pertinent information. They are essential to make speedy and useful employee related decisions" (Sachdeva et al., 2009, p. 43). The specific attributes

  • Technology War and Fascism by

    However, Marcuse equates political art to "revolutionary" art, and feels it is an important, even vital part of any culture. He writes, "The most revolutionary work of art will be, at the same time, the most esoteric, the most anti-collectivistic one, for the goal of the revolution is the free individual" (Marcuse 203). By the end of the essay, its inclusion makes sense, because Marcuse neatly ties in his


Read Full Essay
Copyright 2016 . All Rights Reserved