Verified Document

Advances In Technology Have Transformed The Way Essay

¶ … advances in technology have transformed the way that firms are addressing security related issues. This is because most devices have become much smaller and they are often focused on providing users with remote access. As a result, these kinds of platforms are a potential danger to all organizations. ("Guidelines for Securing Mobile Devices," 2012) Evidence of this can be seen with observations in a report prepared by Stanford University which said, "Mobile computing devices can store large amounts of data, are highly portable and are frequently unprotected: they are easy to steal or lose, and unless precautions are taken, an unauthorized person can gain access to the information stored on them or accessed through them. Even if not stolen or lost, intruders can sometimes gain all the access they need if the device is left alone and unprotected, if data is 'sniffed out of the air' during wireless communications, or if malware is installed. The results can include crippled devices, personal data loss, disclosure of non-public University data, and disciplinary actions for the device owner." These different areas are showing the challenges of shifting platforms. In the future, these issues will become a major threat that must be continually dealt with on a regular basis by all corporations. ("Guidelines for Securing Mobile Devices," 2012)

As a manager, how would you plan on securing organizational data?

In order to address any kind of security issues; requires that an all-encompassing approach is utilized. This will be accomplished by focusing on a number of different areas that will improve the total amounts of protection. These include: conducting regular training, encrypting all data, having back up procedures in place and rotating the SSH regularly. The combination of these factors will work in correlation with each other to address a host of challenges. Once this takes place, is when the firm will be able to adapt and evolve with new threats. This is the point that the underlying risks will be dramatically reduced. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

In the case of conducting regular training, there needs to be an emphasis on understanding the threats facing the company and identifying potential solutions....

The best way that this can be achieved is through knowing the environment. This means analyzing the possible weaknesses and threats. Once this happens, is when personnel must create a protocol that will address these challenges. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)
After this occurs, is when effective training must be conducted on a regular basis. This will take place at least once per quarter through a series of workshops and practical examinations. This will teach staff members about possible early warning signs of security breaches and how to effectively respond. When this occurs, employees will serve in a role of monitoring and identifying any kind of possible issues. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

It is at this point that the underlying threat can be isolated. Every quarter, this training will be continually updated to reflect new threats and how to deal with them. If this kind of approach is used, it will increase the total number of people monitoring these issues (which will have an impact on the firm's ability to mitigate these challenges). ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

The encryption of all data is when any kind of sensitive information is available only to the end users. For those individuals who are seeing this information over a mobile device, these services are often unavailable. This is because the majority of data is not protected in the same kind of format as a secured network (thanks in part to the cloud applications that are being utilized). To address these kinds of challenges, all firms must have a third party provider that will encrypt all data. This will make it more difficult for hackers to view sensitive information that is being transferred from the server and the mobile device. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

Having back up procedures in place is looking beyond the common solutions that are often utilized by firms. What normally happens is most firms will have some kind of certificate of authority (CA). This is an application that is designed to provide added assurances about the safety of using a particular platform. ("2011 IT Security…

Sources used in this document:
References

2011 IT Security Practices. (2011). Venafi.com. Retrieved from:http://www.venafi.com/wp-content/uploads/2011/09/Venafi-Top-Five-Best-Practices-and-Failures.pdf

Enterprise security best practices. (2011). Microsoft. Retrieved from: http://technet.microsoft.com/en-us/library/dd277328.aspx

Guidelines for Securing Mobile Devices. (2012). Stanford University. Retrieved from: http://www.stanford.edu/group/security/securecomputing/mobile_devices.html

Reduce Costs while Improving Reliability. (2010). Inet Inc. Retrieved from: http://inetinc.net/doc/managed_hosting_whitepaper.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology Technological Advances Have Impacted Every Area
Words: 1219 Length: 4 Document Type: Essay

Technology Technological advances have impacted every area of human existence on almost every area of the planet, with few exceptions. Nearly every aspect of daily mundane life is affected by technology, including communication and transportation. However, one area of daily life is even more impacted and transformed than others. That area is food and eating. Food production has changed dramatically since the Industrial Age. Indeed, since the invention of the cotton

Technology Blessing or Curse
Words: 1160 Length: 4 Document Type: Research Paper

Technology: Blessing or Curse? Imagine studying machinery that is becoming smaller and smaller every day. What will one discover? This is a hot topic that is on a lot of individuals mind in our society today. People are curious about how it is evolving, and ways to stay current with it. One will discuss whether or not this is a blessing or a curse for technology. According to a recent study by

Technology and the Learner-Centered Learning Environment One
Words: 1673 Length: 6 Document Type: Term Paper

Technology and the Learner-Centered Learning Environment One of the primary goals of teachers and educators is ensuring that student learning is successful. The educational system within the United States is constantly being evaluated and re-evaluated to determine what technologies and programs are best suited to enhance student achievement. In modern times technology has become synonymous with progress, change, and advancement and learning. It has become a staple in the lives of

Technology on Health Care Services: There Are
Words: 2415 Length: 8 Document Type: Essay

Technology on Health Care Services: There are several promising breakthroughs that have been made in the health care sector in the past decade. These promising breakthroughs have emerged due to the influence of information technology in this field. The main goal of these improvements in health care is to enhance the possibility of prolonging and improving people's lives amid the rise in the occurrences of diseases. Some of the recent

Technology in History
Words: 2807 Length: 8 Document Type: Term Paper

Technology [...] food processing in history, and how the development of food processing technologies has altered lives for the better. Food processing, and the healthy, edible food it produces, is taken for granted in today's society. However, in the nineteenth century, fresh food was not normal, and technologies were developed to preserve food, so that more Americans could enjoy fresh, wholesome food year round. It was one of the

Technology on Personal Relationships the
Words: 13203 Length: 50 Document Type: Dissertation

In many ways, students live both in the land-based or physical world as well as in the virtual world; leading what some considers parallel lives. Helliwell & Putman (2004) posit that social networking sites may offer an avenue for the development of greater social capital which may serve to further reinforce students' likelihood of integrating Facebook and other social media sites into their regular routines. A suggestion made as to the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now