Page 74 - CDM-Cyber-Warnings-March-2014
P. 74
$"41(38 .3 )423 (,/.13 -3 (3;2 $22$-3( + The rapid evolution of technology has ensured that the universe is now a much smaller place. While continuous developments are encouraged and appreciated, it has become increasingly difficult to guarantee that our information is presented in a secure manner. Without a proper security system, years of indispensable records, personal information and documents of a sensitive nature can be mislaid or destroyed in the blink of an eye. High-quality security practices can be the catalyst behind improved business practices and greater revenue. Simple procedures can be initiated easily in the workplace, these include aspects such as; amalgamating security protocols into everyday tasks; establishing and maintaining quality anti- virus software; ensuring important files are stored in a safe offsite setting; ensuring proper processes and procedures are understood and adhered to stringently; and enlightening the user population about how exactly system compromises can be circumvented. Even though no system connected to the network is ever guaranteed complete safety, your ability to evade a compromising situation can be the difference between continued integrity and reputation degeneration. On an escalating level, information technology and computing impacts every facet of daily life. Collectively, we use technology to educate and discover, to correspond and pool resources, to observe procedures and finances, to obtain and distribute valuable information and services, you name it, technology is growing ever more necessary and powerful. In this time of a rapid technological revolution, businesses are becoming more susceptible to hackers and crippling viruses. So many information security specialists recognize the significance of policies that alleviate legal responsibilities, condense costs and guarantee security protecting infrastructure and assets is installed and updated regularly. Basically, a department security plan should be fundamentally adhered to within any business. This plan should address security issues and other IT concerns such as file-sharing and virus protection. A proper understanding of controls and recovery procedures in the face of adversity should also be discussed and reviewed thoroughly. You wouldn’t drink water that was contaminated with insecticides, you wouldn’t set out on an epic road trip without checking your oil, so why would you neglect the assessment of IT security? " # % " $ " # ! !