Wednesday, August 7, 2019

Security Threats and Defenses Essay Example | Topics and Well Written Essays - 500 words

Security Threats and Defenses - Essay Example It is therefore the responsibility of any success oriented organization to enlighten its employees on the underlying security threat. An ethical, well goal oriented team is always desired. Information security is a major concern to all organizations. It ought to be part of every organization’s internal controls and operations. These controls ought to be internalized in a way that the employees are made to realize that violation of security puts them at a greater risk. These services to make employees feel their loyalty is crucial to the success of the business. In addition, information security need be given priority and adopted as a distinct value in any institutional culture governing staff behavior. It is therefore necessary to review security policies by offering training forums to employees. Another way of promoting security is by way of regularly reviewing security guidelines to ensure they are relevant an in line with the expected performance. Communication between the management and the employees ought to be health for security purposes. This aids in that employees can report underlying identified security threats before they occur. Healthy communication patterns not only boost security, but also save the company from incurring unnecessary costs arising from security compromises. Fraudsters have devised many forms of interfering with the security systems of organizations. For instance, there has been intensive use of ignorance of controls by employees. This occurs in organizations where employees think some process are long and bureaucratic and hence, want a quick way out of it. Ignorance is no defense as it compromises the security of an organization (Hadnagy, 2011). It also occurs where employees are not well briefed on internal controls and information security patterns of an organization. Proper security training need to be impacted on the employees to avoid embarrassment when sensitive and confidential information is

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.