INFORMATION SECURITY

docx

School

Harvard University *

*We aren’t endorsed by this school

Course

S

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by ChefLionPerson597

Report
1 Information Security Student Name Institutional Affiliations Facilitator Course Date
2 Information Security Kaila & Nyman's (2018) article "Information security best practices" introduces a comprehensive security framework for organizations. Managing information security forms the basic part of the basic function of any business. The scaling height of malware threats facing many organizations motivated the authors to develop various steps that organizations and individuals can use to protect their data from such attacks. According to Kaila & Nyman (2018), the four useful steps in enhancing the focus include identifying assets and risks, protecting accounts, systems, clouds, and data, implementing a continuity plan, and monitoring and reviewing. According to Kalia & Nyman (2018), an essential step towards implementing information security is by understanding the key information that must be protected. If organizations' staffs understand their firm and what they offer to the organizations, they will be able to offer enough security to their data through the implementation of information security. I can use the information in the article to enhance information security in my daily activities. I can take the necessary measures to protect their data and information by following the steps emphasized in the article. For instance, the article has provided an important step for enhancing security by identifying and assessing security threats. I can identify security threats in my laptop and mobile phone as per the advice of the information provided in the article. As a data-sensitive person, I can protect sensitive information by creating strong passwords on my phones and avoiding public WI-FI. Furthermore, I can update my mobile phone and computer software to protect data theft from malicious activities. Notably, I can use two-factor authentication and avoid pushing message scams to help protect the key information in my phones and computer programs. The article suggests that individuals should be careful about sharing information online and limit access to systems and software to only trusted individuals.
3 Companies can adopt the suggestions provided in the article by ensuring proper governance of fundamental security measures are implemented. Organizations should use the best practices stated in the article as a starting point for enhancing security systems in its operations. As organizations’ businesses expand, they should add more security procedures. Businesses should take proactive measures to reduce risks and find a balance between the price of current security solutions and their value. According to the article, proper due diligence must constantly adhere to specified security frameworks and the right review and evaluation methods to ensure these procedures are effective. Also, companies should use the material in the article while drafting the policies that control their information security. Organizations might use the knowledge to train their employees and foster a culture of information security awareness. Through following the basic steps mentioned in the article, businesses can ensure that their information and data are secure and they are following the essential governance of their business. The challenge with the article is that the information that is supplied seems to be overly simplistic both for people and for companies. The article outlines the fundamental measures businesses or people should follow to protect their data. Yet, not every firm appears to be the same since some organizations have sophisticated structures and processes and employ different technologies, which require more modern security measures. As a result, the article does not propose ways that businesses should evaluate their requirements for network security and adapt their infrastructure accordingly. On the other hand, the article suggests additional reading as a means of directing businesses toward the achievement of more security frameworks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Reference Kaila, U., & Nyman, L. (2018). Information Security Best Practices. Technology Innovation Management Review . https://doi.org/10.22215/timreview/1198