Ask Business Management Expert

Discuion Post Responses

Respond to two or more of your colleagues in one or more of the following ways:

• Compare your findings to the list of security trends your colleague identified. Look for similarities and differences. Share the insights you gained.

• Offer additional ideas or recommendations about how the security issues your colleague identified could potentially affect business or the organization your colleague discussed. Provide examples or observations from your experience or readings from the week.

• Offer your thoughts about potential ways that business or the organization identified by you colleague could mitigate or eliminate the risks posed.

• Share how the trends identified by your colleague could impact or potentially impact your organization or one with which you are familiar. Discuss how your organization could mitigate or eliminate the risks posed.

POST1

Data security tends to be an area of growing concern for companies both large and small (Phan, Flo, Patel, 2016). It goes without saying that it is very important for companies to keep their information safe, secure, and out of the wrong hands. Through my research, I have found that some current trends related to data security. One trend that I located is the focus of the FTC (Federal Trade Commission) over the last year. One of the additional areas that they have been focusing on is taking action against companies that use technology to take control of or collect information from consumers without their knowledge (Phan, Flo, Patel, 2016). This is an effective trend because it further protects customers and customer's information, which should be the goal of every company.

Another trend that I found upon research is the amount of time that it can take for a security breach to be noticed and responded to. Believe it or not, the average amount of time for a breach to be detected and those effected notified is one hundred and thirty-four days (Maloni,2015). That is quite some time for a business to realize that their information has been hacked and that is even longer for customers to be made aware of the issue as well. Due to the issue being a time-sensitive one, companies need to find ways to react quicker when classified information is compromised (Maloni,2015). By enabling a smarter and faster detection and response process, liabilities can be lessened and well as other damages.

I work with a lot of confidential and customer-sensitive information in my current workplace. One practice that we have in use is the limit of cell phone usage at our desks. While, we understand that most employees are not going to purposely take their phone in order to steal, record, or even possibly sell customer information, the practice is actually put in place to prevent accidentally exposure of customer information. For example, say I am taking the typical, "busy at work" selfie that I plan to post to Instagram or some other social media site. I do not realize that my computer was on in the background and now all of the sudden Mr. Smith's information that I had pulled up is visible for all of my followers to see. There is no need to say that this simple, unintentional error could lead to much damage and liabilities for the company.

As a manager, I will make sure that I am my employees aware of both intentional and unintentional data breaches such as the one that I described above. I will educate them on best practices such as limited cell phone usage and to always be aware of their surroundings as well. I previously worked at a bank and I had a customer that distracted me and was able to steal customer information. I will train employees on some common things that criminals try to do in order to get information so they will be aware of what to look for.

POST 2

Two trends related to data information, information systems, or information technology, security are context-aware security and information security outsourcing. Context-aware security is used for situational information like identity, location, time of day, device type, business value of data and reputation to make more effective, efficient and accurate information security decisions (Ashford, 2013).Information Security outsourcing is having security standards and in order to meet the standards organizations outsource security protection to a managed security service provider (MSSP) (Hui & Yue, 2013).

These security issues are challenging businesses because maintaining a great level of security is a necessity within an organization. It is how the business aspect of an organization is made to function for accurately. With context-aware security an organization has to be able to understand how and what the security can do to support current and future business (Hui & Yue, 2013). And with information security outsourcing organization have to be aware of security risks for clients (Ashford, 2013). With my organization there is a great deal of valuable information that is needed and being able to have the right security is essential because not all trends are needed for all organizations.

As a manager I would protect data and information used by making sure that personal and valuable information needed is not being exposed to others and that when it comes to patient information it is kept every secure and guidelines and policies are being followed in order to maintain privacy.

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M92271956
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Business Management

Name a company that addressed a recent ethical problem in a

Name a company that addressed a recent ethical problem in a positive way. Also, explain how or if this positively affects us as a community?

When it is appropriate to use the trade-off process what

When it is appropriate to use the trade-off process. What conditions apply, and the technical evaluation criteria that might be used?

Need help with a essay with the following phrase for

Need help with a essay with the following phrase for analyzing : " Capitalism is at the heart of how people and organisations are managed in contemporary society" May i ask for a better explanation of the question? Also ...

How could these three tenets of the auburn creed be used to

How could these three tenets of the Auburn Creed be used to motivate others: "I believe that this is a practical word and that I can count only on what I earn. Therefore, I believe in work, hard work." "I believe in educ ...

How can these two tenets of the auburn creed by used in

How can these two tenets of the Auburn Creed by used in addressing teamwork issues: "I believe in honesty and truthfulness, without which I cannot win the respect and confidence of my fellow men." "I believe in the human ...

Discuss the advantages of having and interacting in a

Discuss the advantages of having and interacting in a diverse workplace. Consider the wide range of ideas and perspectives that a range of team members bring to a team, that are of differing ages, ethnic backgrounds and ...

Parmigiano-reggiano global recognition of geographical

Parmigiano-Reggiano: Global Recognition of Geographical Indications What historical factors have helped support the consortium's claims for the geographic specificity of Parmigiano-Reggiano and Parmesan? What are the eco ...

Communication planthis communication plan will be a roadmap

Communication Plan This communication plan will be a roadmap on how the new division will best be able to communicate with Biotech's corporate headquarters, suppliers, other divisions, and internally. This should lay out ...

Discuss strategies to obtain feedback from a customer and

Discuss strategies to obtain feedback from a customer and clients when working in sales.

Describe different networking methods and the advantages

Describe different networking methods and the advantages and disadvantages of them?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As