INFORMATION SECURITY
docx
keyboard_arrow_up
School
Harvard University *
*We aren’t endorsed by this school
Course
S
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by ChefLionPerson597
1
Information Security
Student Name
Institutional Affiliations
Facilitator
Course
Date
2
Information Security
Kaila & Nyman's (2018) article "Information security best practices" introduces a
comprehensive security framework for organizations. Managing information security forms
the basic part of the basic function of any business. The scaling height of malware threats
facing many organizations motivated the authors to develop various steps that organizations
and individuals can use to protect their data from such attacks. According to Kaila & Nyman
(2018), the four useful steps in enhancing the focus include identifying assets and risks,
protecting accounts, systems, clouds, and data, implementing a continuity plan, and
monitoring and reviewing. According to Kalia & Nyman (2018), an essential step towards
implementing information security is by understanding the key information that must be
protected. If organizations' staffs understand their firm and what they offer to the
organizations, they will be able to offer enough security to their data through the
implementation of information security.
I can use the information in the article to enhance information security in my daily
activities. I can take the necessary measures to protect their data and information by
following the steps emphasized in the article. For instance, the article has provided an
important step for enhancing security by identifying and assessing security threats. I can
identify security threats in my laptop and mobile phone as per the advice of the information
provided in the article. As a data-sensitive person, I can protect sensitive information by
creating strong passwords on my phones and avoiding public WI-FI. Furthermore, I can
update my mobile phone and computer software to protect data theft from malicious
activities. Notably, I can use two-factor authentication and avoid pushing message scams to
help protect the key information in my phones and computer programs. The article suggests
that individuals should be careful about sharing information online and limit access to
systems and software to only trusted individuals.
3
Companies can adopt the suggestions provided in the article by ensuring proper
governance of fundamental security measures are implemented. Organizations should use the
best practices stated in the article as a starting point for enhancing security systems in its
operations. As organizations’ businesses expand, they should add more security procedures.
Businesses should take proactive measures to reduce risks and find a balance between the
price of current security solutions and their value. According to the article, proper due
diligence must constantly adhere to specified security frameworks and the right review and
evaluation methods to ensure these procedures are effective. Also, companies should use the
material in the article while drafting the policies that control their information security.
Organizations might use the knowledge to train their employees and foster a culture of
information security awareness. Through following the basic steps mentioned in the article,
businesses can ensure that their information and data are secure and they are following the
essential governance of their business.
The challenge with the article is that the information that is supplied seems to be
overly simplistic both for people and for companies. The article outlines the fundamental
measures businesses or people should follow to protect their data. Yet, not every firm appears
to be the same since some organizations have sophisticated structures and processes and
employ different technologies, which require more modern security measures. As a result, the
article does not propose ways that businesses should evaluate their requirements for network
security and adapt their infrastructure accordingly. On the other hand, the article suggests
additional reading as a means of directing businesses toward the achievement of more
security frameworks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Reference
Kaila, U., & Nyman, L. (2018). Information Security Best Practices.
Technology Innovation
Management Review
.
https://doi.org/10.22215/timreview/1198