Mobile AIS Security Issues Essay

PAGES
2
WORDS
496
Cite

Marvin (2015) interviews Dr. Chandra Bhansali about cloud-based accounting systems, discussing a couple of issues. The first is the way that cloud-based solutions are changing the way SMBs do business, and the second is the role that security plays in this. Most small businesses become interested in cloud-based solutions because of the efficiency gains, and in particular solving the pain point related to payroll, but they are concerned about security Bhansali is clear that security is an essential component for a cloud-based system, because the market demands it. Accounting data is sensitive, and companies that utilize cloud-based solutions insist that this information be protected to the highest standard.Bhansali notes that his company moved to Amazon Web Services, which has one of the more secure platforms. Sensitive data is encrypted, in particular things like bank information, social security numbers and employee identification numbers. Bhansali then points out, without getting into specifics, that "we layer a lot of information technology and security (ITS) technologies on top of that to reduce the risk." This approach is something of a shotgun approach, and Bhansali is not specific in the article about what particular apps are utilized. He is...

...

It doesn't talk about multi-factor authentication, security certifications, or even what apps were in Bhansali's stack, despite alluding to the fact that his company uses them. For the practitioner -- either the end user curious about security or for the mobile AIS company -- the article underdelivers on its promise of useful information about security. All it really says is that security is important, but we already knew that. One would have preferred to find more illuminating information out there.
Comment 2: One mobile AIS app is Bench Accounting. On their website, they talk about security in terms of the human element -- background checks and not outsourcing their staff. That the human element is critical in information security is a known thing; these issues might help a little but the wording doesn't directly address issues like phishing or Trojans that rely on human error to gain access to information.

Ideally, you'd want to see the application have passed some sort of security audit to get certified, and…

Cite this Document:

"Mobile AIS Security Issues" (2017, January 31) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/mobile-ais-security-issues-essay-2167892

"Mobile AIS Security Issues" 31 January 2017. Web.25 April. 2024. <
https://www.paperdue.com/essay/mobile-ais-security-issues-essay-2167892>

"Mobile AIS Security Issues", 31 January 2017, Accessed.25 April. 2024,
https://www.paperdue.com/essay/mobile-ais-security-issues-essay-2167892

Related Documents

Galileo Product Idea Description Most technical innovations in any field have been combinations or amalgams of software and hardware applications that were never meant to be used together. However, they have nevertheless come into existence because someone decided to marry up these unimagined elements in combination with each other. To midwife these projects to full fruition, startup money is needed. As usual, the military is the usual maternity ward for such applications and

Intent to perform a greater good would not affect the possibility of being exposed to a prison sentence of up to 20 years and a fine of up to $250,000, plus possible penalties under state law. Montana compares this legislation with that of the regulation of firearms. It is not the mere possession of malicious code that is criminalized, but the use and the damage to computer systems and association

Contingency Planning Information Security contingency plans are very important for firms operating in today's world, where cyber security is a top issue a result of business's technological and digital dependence. This paper will discuss the planning steps, possible recovery options, and recommended testing requirements needed to support a successful business contingency/continuity of operations environment. Included will be recommendations for a proposed 24-month cycle business contingency testing plan, what should be tested

In a descriptive syllabus for a graduate seminar in AI professor Donald gives insight into the form that AI research is taking and the bottom line is that internal brain functioning, switching, neurotransmissions, and patterns are being dissected to give the student a greater sense of the workings of the human mind so these same students may go forwards and attempt to recreate, decidedly small scale (likely single or