Thursday, January 1, 2009

Information Technology Systems-Security, Data Back-up & Recovery

 

Well, it’s
the first day of the year.... today would be a good day to examine the aspects of; security
implementation.

1.     What are the company’s major information security threats?

 

Security threats are always possible; a company’s major concerns are data security breaches, weak passwords, personal use, disaster recovery and hackers with the many different viruses, worms and Trojans, which are intended to breach security.

Hackers are attacking the RFID tags and readers, mobile devices and hardware drivers   and using advanced techniques such as root-kits and self-morphing Trojans to gain control of PCs http://media.techtarget.com/searchSecurity/images/spacer.gifthis is an issue that if not corrected, has a potential to cause damage. 

2.     Develop a security awareness training plan for employees and franchisees.

 

Training is available from different IT Security Web Sites as well as private firm which can assist in creating scheduled classes which are designed for businesses with the need for more security in their information system networks.

 The identification of potential security threats to a network would be included in the training, password strength along with a 90 day password change policy. Personal use would be limited to only company related activities, and there should be strict policies with regard to the internet. Daily logs will be kept as to reference during evaluations.   

3.     Which Internet-based data backup plans should be used?

Internet-based data backup is vital to a company’s security implementation along with a disaster data recovery plan. It is a long process; users will back up their data with the help from security technicians and then, if a disaster would happen, affected areas would be protected.

An Internet-based data backup plan would be recommended. This is available through a host provider and would complement the company’s security already in place. These Internet data backup sites will be recommended by the installer. The company’s options are to develop data security and a backup program along with scheduling monthly evaluations and data backups.

No comments:

Post a Comment