Friday, March 8, 2019

Information security Essay

Most organizations to daytime be adopting and integrating technologies in their take with an aim of improving production, efficiency, profitability and the competitive advantage in the market. This has been quicken by the increasing globularization and innovation of hot technologies which pose a major(ip) competitive threat to many organizations. Also, formulation of environmental standards as well as increase expectation on the standards and quality of goods and work by both the government and customers has besides necessitated adoption of new technologies to check off this is met.New technologies in use today like the web 2. 0 and also the new internet as well as radiocommunication technologies have led to increase efficiencies as well as increased productivity for approximately organizations. However, despite the advantages which accrue from introduction and use of new technologies in organizations, they pose major protective covering threats to an organization. Data hi jack by criminals as well as terrorism threats atomic number 18 some of the ch all toldenges that organizations be facing during new engine room implementation processes (Bazelon, Choi & Canady, 2006).Security issues in adhesion to new technologies implementation in an organization Security is a vertex concern for most business since it may lead to destruction of a companys constitution thus affecting the competitiveness of an entity. With increased ball-shapedization and increased terrorist threats, aegis take a chances have increased posing a major threat to most organizations. One of the major threats that companies face plot of ground implementing discipline technologies are the risk of losing or protecting sensitive data. info technologies especially via internet and other wireless technologies are accessible globally which poses a major threat to an organization. Organizations hold private and sensitive knowledge dateing their employees, production processes and also marketing strategies which are vital for competitive advantage. However, with engine room implementation, and the dynamism in technology, such(prenominal) data may be accessed by unauthorized singulars causing a business great harm in price of profitability. This also exposes the employees as well as an organizations customers at risk of fraudulent activities via technologies.Information security experts insist that safe like information networks operate or cross borders with no regard for the provincial and national boundaries, also security vulnerabilities and threats pass in the analogous office thus necessitating greater and stern security measures to ensure that the threats are minimized (Hinojosa, 2005). Another threat that organizations are facing is terrorist attacks and threats. Currently, there are many terrorist groups which operate globally and they employ utmost technologies to carry reveal their tasks and to harass businesses and employees as well as the c ustomers.An increase in global terrorist organizations in the world that are connected via the new technologies poses a major security threats to most organizations in the world. Terrorists may not only be interested with soliciting the financial and production processes of an organization, but also the structural and day to days activities of an organization with an aim of identifying weak areas or points which could be apply to attack an organization. This is made possible by new technologies which enable and then to tamper the security measures taken by an organization to ensure that it is defend (Sussman, 2008).Phishing and data mining is also another information security risk that is faced by organizations during implementation of technologies in an organization. Phishing refers to the unauthorized use of person-to-person information of another person which is obtained through networks. It also involves alteration of an individuals computer software with an aim of obtaining the computer owners personal information by scrupulous individuals and for the purposes of defrauding the person or harming their reputation or career.With implementation of new technologies in an organization, the entity is enabled to sell its goods and services online and all the transactions are carried without having to meet the customer or the client. While making the payments, a client gives his private financial data depending on the room of payment which he or she uses. Computer criminals have a counseling of tampering with or gaining access of such information which they can see to make purchases while pretending to be the clients.The business thus faces a risk of universe sued by a client on such grounds and for lack of commensurate protection measures. This has increased the comprise of implementing technology especially with different cases of security breach being reported today. Organizations are supposed to ensure that the private information of their clients a nd employees are well protected and that their privacy is upheld despite the cost this may involve (Ena, 2008). Risk of acquittance of important documents by an organization has also been a major security issue while implementing information technology.Apart from the risk of terrorist threats and phishing, an organization also faces the risk of losing vital information through dangerous programs such as the viruses which are transmitted via the internet and other networks. If such programs find their way to the computers and other technologies in a company, a company may risks losing most of its vital information as these programs corrupts the whole network system in an area. This could be dangerous for and organization as it may lead of lessen productivity, increased costs and reduced earnings (Blankespoor, 2005).With increased awareness of information security threats increasing in the world, the attackers have changed their tactics posing even out a major threat to an organiz ation. Most of the attackers are usually professed(prenominal) information technologists who invent new methods of accessing data from an organization despite the security measures taken. As mentioned earlier, technology is changing at a very high speed and so are the security threats to an organization. The dynamism of technology is a risk which cost organizations heavily as they try to keep step with it.While implementing new technologies, organizations are also faced with the problem of testing the validity of the technology. Most of the cases involving security breach end up being the problem in an organization. IT companies exonerate themselves by arguing that lack of adequate security policies in an organization are the major causes of any cost that an organization may incur (Wallace, Lusthaus. & Kim, 2005). Conclusion Information technology is a major strategy that has enabled most of the businesses to perform well in terms of growth and expansion.New technologies have bee n on high demand in the recent past especially as most organizations go global which necessitates networking. Technology improves the efficiency, effectiveness and the overall productivity of an entity. However, it poses major threats to the privacy of a company as well as its clients and employees. Stern security measures should be taken to ensure that technology implantation in an organization does not turn out to be more costly. This can be do though formulation of technology security policies and procedures to ensure privacy is upheld.

No comments:

Post a Comment