Documents May Contain Sensitive Give Your Opinion

Documents May Contain Sensitive Give Your Opinion

Read Response-1 below and give your opinion on response given by one of your classmate. your answer should be supported with research unless the question is opinion oriented.. Responses to discussions below should not be “I agree” or “I like the way you stated that.” These responses should again be insightful, offering an opinion or facts based on your research and experiences. The response to one classmate should be a minimum of 200 words. See APA criteria for citing resources.

Question-1 : our boss mentions that recently a number of employees have received calls from individuals who didn’t identify themselves and asked a lot of questions about the company and its computer infrastructure. At first, he thought this was just a computer vendor who was trying to sell your company some new product, but no vendor has approached the company. He also says several strange e-mails requesting personal information have been sent to employees, and quite a few people have been seen searching your company’s trash dumpsters for recyclable containers. Your boss asks what you think about all of these strange incidents. Respond and be sure to provide recommendations on what should be done about the various incidents.

Response-1 ( Below is response given by some individual for above question, Read Response-1 below and give your opinion on response . your answer should be supported with research unless the question is opinion oriented.. Responses to discussions below should NOT be “I agree” or “I like the way you stated that.” These responses should again be insightful, offering an opinion or facts based on your research and experiences. The response to one classmate should be a minimum of 200 words. See APA criteria for citing resources. You must provide a minimum of a reference, in APA format, in your original response.)

Response 1:

Security Threats Measures In the Organization

From the discussion, someone is trying to obtain the company’s sensitive information from various means. The outsider is practicing an identity theft, faking to be a computer vendor, obtaining employees’ information by phishing method, and looking for documents in the organization’s dumpster. Thus, the company should initiate the necessary security measures. Specifically, the organization must initiate the following measures to protect its data:

Firstly, the company should train and warn its employees against sharing information to unknown outsiders. In this case, it is evident that the company is not expecting a computer vendor to call. So, any call attendant should verify all callers. The call attendant should then inform their supervisor before sharing any information concerning the company (Collins & British Computer Society, 2014). In addition, the company should enhance its access controls, such that not every employee has access to the company’s entire infrastructure.

Secondly, the company must have a strong firewall to avoid emails related to security threats (Morgan, 2015). Also, the company should identify any unreliable emails and report them as spam. The organization should also create awareness in the firm regarding possible threats related to security. The team assigned to cater to the network should often scan the network system to ensure that the company is free from vulnerabilities.

Thirdly, employees should ensure that they shred any document before disposing of it. This is because some documents may contain sensitive information concerning the organization (Kubitscheck, 2014). The measure will ensure that disposed of documents in the recyclable containers are free from any future security threats.

In summary, it is evident that security threats in a company are inevitable. So, the company should keep its data secure from any possible threats.

References

Collins, J., & British Computer Society. (2014). Security Architect : Careers in Information Security. London: BCS, The Chartered Institute for IT.

Kubitscheck, V. (2014). Integrated Assurance : Risk Governance Beyond Boundaries. Farnham: Routledge.

Morgan, J. M. (2015). Cybersecurity and Cyber-information Sharing : Legal and Economic Analyses. New York: Nova Science Publishers, Inc