Thursday, July 18, 2019

Information security Essay

Most governments today argon adopting and integrating technologies in their lay off product with an bring forth of improving production, efficiency, profitability and the competitive favor in the market. This has been accelerated by the increase worldwideization and innovation of reinvigorated technologies which do a study(ip) competitive scourge to many musical arrangements. Also, formulation of environmental standards as healthful as change magnitude vista on the standards and quality of goods and services by both the government and guests has alike necessitated betrothal of forward-looking technologies to get a line this is met. stark naked technologies in use today like the meshwork 2. 0 and similarly the new net profit as healthy as receiving set technologies oblige led to change magnitude efficiencies as well as change magnitude productiveness for most(prenominal) brass sections. However, despite the advantages which accrue from entre and use of new technologies in organizations, they present major auspices department brats to an organization. Data highjack by criminals as well as terrorism threats ar some of the ch tout ensembleenges that organizations atomic number 18 approach during new engine room retaining into action processes (Bazelon, Choi & Canady, 2006). protection issues in regard to new technologies execution in an organization Security is a top concern for most business since it whitethorn lead to desolation of a associations genius thus affecting the competitiveness of an entity. With increased globoseization and increased terrorist threats, aegis take a chances have increased present a major threat to most organizations. One of the major threats that companies face while implementing info technologies argon the risk of losing or protecting minute entropy.Information technologies in particular via internet and other wireless technologies be doorwayible globally which poses a major t hreat to an organization. Organizations curtail private and sensitive study regarding their employees, production processes and withal marketing strategies which are bouncy for competitive advantage. However, with technology implementation, and the dynamism in technology, such data may be accessed by unauthorized individuals causing a business great harm in terms of profitability. This also exposes the employees as well as an organizations customers at risk of fraudulent activities via technologies.Information warranter experts insist that just like teaching networks ensnarl or cross borders with no regard for the provincial and national boundaries, also earnest vulnerabilities and threats pass in the similar way thus necessitating greater and layabout security measures to ensure that the threats are minimize (Hinojosa, 2005). Another threat that organizations are facing is terrorist attacks and threats. Currently, there are many terrorist groups which operate globally a nd they employ high technologies to carry out their tasks and to harass businesses and employees as well as the customers.An increase in global terrorist organizations in the world that are attached via the new technologies poses a major security threats to most organizations in the world. Terrorists may not only be interested with soliciting the financial and production processes of an organization, but also the geomorphologic and day to days activities of an organization with an have of identifying weak areas or points which could be use to attack an organization. This is made possible by new technologies which enable then to shirk the security measures taken by an organization to ensure that it is protected (Sussman, 2008).Phishing and data minelaying is also another schooling security risk that is faced by organizations during implementation of technologies in an organization. Phishing refers to the unauthorized use of person-to-person information of another person which is obtained finished networks. It also take ups alteration of an individuals calculating machine software with an aim of obtaining the computer owners personal information by scrupulous individuals and for the purposes of defrauding the person or harming their reputation or career.With implementation of new technologies in an organization, the entity is enabled to sell its goods and services online and all the transactions are carried without having to meet the customer or the client. While making the payments, a client gives his private financial data depending on the mode of payment which he or she uses. Computer criminals have a way of tampering with or gaining access of such information which they can skirt to make purchases while pretending to be the clients.The business thus faces a risk of being sued by a client on such grounds and for overleap of adequate protection measures. This has increased the bell of implementing technology especially with different cases of se curity breach being reported today. Organizations are supposed to ensure that the private information of their clients and employees are well protected and that their cover is upheld despite the bell this may involve (Ena, 2008). Risk of loss of important documents by an organization has also been a major security issue while implementing information technology.Apart from the risk of terrorist threats and phishing, an organization also faces the risk of losing vital information through with(p) dangerous programs such as the viruses which are transmitted via the internet and other networks. If such programs find their way to the computers and other technologies in a company, a company may risks losing most of its vital information as these programs corrupts the whole network system in an area. This could be dangerous for and organization as it may lead of reduced productivity, increased costs and reduced earnings (Blankespoor, 2005).With increased awareness of information securit y threats increase in the world, the attackers have changed their tactics posing even a major threat to an organization. Most of the attackers are usually professional information technologists who invent new methods of accessing data from an organization despite the security measures taken. As mentioned earlier, technology is changing at a very high speed and so are the security threats to an organization. The dynamism of technology is a risk which cost organizations heavily as they try to keep one thousand with it.While implementing new technologies, organizations are also faced with the problem of testing the severeness of the technology. Most of the cases involving security breach end up being the problem in an organization. IT companies exonerate themselves by arguing that deficiency of adequate security policies in an organization are the major causes of any cost that an organization may incur (Wallace, Lusthaus. & Kim, 2005). deduction Information technology is a major strategy that has enabled most of the businesses to perform well in terms of growth and expansion.New technologies have been on high demand in the recent past especially as most organizations go global which necessitates networking. Technology improves the efficiency, effectiveness and the overall productivity of an entity. However, it poses major threats to the privacy of a company as well as its clients and employees. john security measures should be taken to ensure that technology implantation in an organization does not turn out to be more costly. This can be done though formulation of technology security policies and procedures to ensure privacy is upheld.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.