Verified Document

Advances In Technology Have Transformed The Way Essay

¶ … advances in technology have transformed the way that firms are addressing security related issues. This is because most devices have become much smaller and they are often focused on providing users with remote access. As a result, these kinds of platforms are a potential danger to all organizations. ("Guidelines for Securing Mobile Devices," 2012) Evidence of this can be seen with observations in a report prepared by Stanford University which said, "Mobile computing devices can store large amounts of data, are highly portable and are frequently unprotected: they are easy to steal or lose, and unless precautions are taken, an unauthorized person can gain access to the information stored on them or accessed through them. Even if not stolen or lost, intruders can sometimes gain all the access they need if the device is left alone and unprotected, if data is 'sniffed out of the air' during wireless communications, or if malware is installed. The results can include crippled devices, personal data loss, disclosure of non-public University data, and disciplinary actions for the device owner." These different areas are showing the challenges of shifting platforms. In the future, these issues will become a major threat that must be continually dealt with on a regular basis by all corporations. ("Guidelines for Securing Mobile Devices," 2012)

As a manager, how would you plan on securing organizational data?

In order to address any kind of security issues; requires that an all-encompassing approach is utilized. This will be accomplished by focusing on a number of different areas that will improve the total amounts of protection. These include: conducting regular training, encrypting all data, having back up procedures in place and rotating the SSH regularly. The combination of these factors will work in correlation with each other to address a host of challenges. Once this takes place, is when the firm will be able to adapt and evolve with new threats. This is the point that the underlying risks will be dramatically reduced. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

In the case of conducting regular training, there needs to be an emphasis on understanding the threats facing the company and identifying potential solutions....

The best way that this can be achieved is through knowing the environment. This means analyzing the possible weaknesses and threats. Once this happens, is when personnel must create a protocol that will address these challenges. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)
After this occurs, is when effective training must be conducted on a regular basis. This will take place at least once per quarter through a series of workshops and practical examinations. This will teach staff members about possible early warning signs of security breaches and how to effectively respond. When this occurs, employees will serve in a role of monitoring and identifying any kind of possible issues. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

It is at this point that the underlying threat can be isolated. Every quarter, this training will be continually updated to reflect new threats and how to deal with them. If this kind of approach is used, it will increase the total number of people monitoring these issues (which will have an impact on the firm's ability to mitigate these challenges). ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

The encryption of all data is when any kind of sensitive information is available only to the end users. For those individuals who are seeing this information over a mobile device, these services are often unavailable. This is because the majority of data is not protected in the same kind of format as a secured network (thanks in part to the cloud applications that are being utilized). To address these kinds of challenges, all firms must have a third party provider that will encrypt all data. This will make it more difficult for hackers to view sensitive information that is being transferred from the server and the mobile device. ("2011 IT Security Practices," 2011) ("Enterprise security best practices," 2011)

Having back up procedures in place is looking beyond the common solutions that are often utilized by firms. What normally happens is most firms will have some kind of certificate of authority (CA). This is an application that is designed to provide added assurances about the safety of using a particular platform. ("2011 IT Security…

Sources used in this document:
References

2011 IT Security Practices. (2011). Venafi.com. Retrieved from:http://www.venafi.com/wp-content/uploads/2011/09/Venafi-Top-Five-Best-Practices-and-Failures.pdf

Enterprise security best practices. (2011). Microsoft. Retrieved from: http://technet.microsoft.com/en-us/library/dd277328.aspx

Guidelines for Securing Mobile Devices. (2012). Stanford University. Retrieved from: http://www.stanford.edu/group/security/securecomputing/mobile_devices.html

Reduce Costs while Improving Reliability. (2010). Inet Inc. Retrieved from: http://inetinc.net/doc/managed_hosting_whitepaper.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Ways That Make
Words: 5835 Length: 20 Document Type: Thesis

Students can collaborate with students in other schools and other countries as they develop ideas, skills, and products. Students in a class can collaborate outside class without having to meet in person. The theory behind collaborative learning is that the social construction of knowledge leads to deeper processing and understanding than does learning alone (Appalachian Education Laboratory, 2005). The bulletin board and the chat room have become the backbone of

Technology Technological Advances Have Impacted Every Area
Words: 1219 Length: 4 Document Type: Essay

Technology Technological advances have impacted every area of human existence on almost every area of the planet, with few exceptions. Nearly every aspect of daily mundane life is affected by technology, including communication and transportation. However, one area of daily life is even more impacted and transformed than others. That area is food and eating. Food production has changed dramatically since the Industrial Age. Indeed, since the invention of the cotton

Technology and the Learner-Centered Learning Environment One
Words: 1673 Length: 6 Document Type: Term Paper

Technology and the Learner-Centered Learning Environment One of the primary goals of teachers and educators is ensuring that student learning is successful. The educational system within the United States is constantly being evaluated and re-evaluated to determine what technologies and programs are best suited to enhance student achievement. In modern times technology has become synonymous with progress, change, and advancement and learning. It has become a staple in the lives of

Technology on Personal Relationships the
Words: 13203 Length: 50 Document Type: Dissertation

In many ways, students live both in the land-based or physical world as well as in the virtual world; leading what some considers parallel lives. Helliwell & Putman (2004) posit that social networking sites may offer an avenue for the development of greater social capital which may serve to further reinforce students' likelihood of integrating Facebook and other social media sites into their regular routines. A suggestion made as to the

Technology, War and Fascism by
Words: 1991 Length: 6 Document Type: Term Paper

However, Marcuse equates political art to "revolutionary" art, and feels it is an important, even vital part of any culture. He writes, "The most revolutionary work of art will be, at the same time, the most esoteric, the most anti-collectivistic one, for the goal of the revolution is the free individual" (Marcuse 203). By the end of the essay, its inclusion makes sense, because Marcuse neatly ties in his

Technology Assessment in Nursing Changes
Words: 2797 Length: 9 Document Type: Term Paper

A recognized universal educational tool such as Blackboard should have a sophisticated search characteristic in order to increase navigation and productivity about the location. The third barrier concerning the Blackboard is that it does not give an e-mail that is within courses. Contact among teachers and students are done across message boards (Kubala, 1998). In order for a student to obtain significant material they need to start by getting on

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now