Q1 Answer
There are various benefits that a company enjoys by securing its systems. Firstly, securing business systems plays a great role in preventing unauthorized access to confidential business information by unauthorized people such as employees and hackers. Unsecured systems attract unauthorized entry of the systems by intruders who can use the information for their gains at the expense of the company. The introduction of modern technology raises a lot of concern on the need to keep systems secured. Cybercrime is one common act that threatens business information if its systems are not secured (Reddy, 1990).
Additionally, securing systems assist a business in reducing frauds and employees’ theft. Business failure to secure its systems gives employees an opportunity to steal important information from the business and use it to disadvantage the company. If the business information is not secured, hackers may use the system to trace vital information that may give them an opportunity to access even the bank accounts for the business very fast hence end up stealing from the company (iTech security, 2013).
Q2 Answer
There are many tools used in securing business systems in the current business environment. The first tool that is commonly used by businesses to secure its systems is the use of strong passwords on their computers. It is important for companies to ensure system security by using strong passwords with a mixture of characters making it hard for the hackers to access the information. The passwords to various information accounts need to be strictly held the authorized personnel only. This helps the organization in preventing many employees from having access to confidential information of the company.
Secondly, cloud application is another tool that a business can use to secure its systems. Cloud applications secure systems via strong encryption of data making it hard for any intruder to access the information. An outstanding example is the AES 256-bit software which assist businesses to prevent data access by a third party. Finally, businesses can also secure their systems by using antivirus software whose work is to prevent computer systems from viruses and malware that are used by hackers to corrupt the computer systems. However, such software needs to be up to date for them to function effectively (Lonoff, 2015).
Q3 Answer
Disgruntled employees are major risks that face an organization for its failure to secure its systems. Insider job is very common where employees use information from the unsecured systems of the organization for their benefits. It is one among the most serious threats facing organizations which do not secure their systems. This behavior is very common with the members of the IT team who have the knowledge and skills about cybercrime. Such members may cause a lot of danger to the company’s information if the systems are not secured (Laudon & Laudon, 2000).
Additionally, careless employees also present businesses with a great risk if it fails to secure its systems. Careless employees are those who will open confidential accounts of the business when performing their duties especially through the internet or networking systems and fail to log out after using the account. This is a great risk to the business because by so doing information is leaked to third parties who can use it to disadvantage the business.
Finally, viruses, worms, and malware are other risks that pose a danger to a business that has not secured their systems. The virus, worms, and malware are software used by hackers to corrupt the computer system thus allowing them to retrieve any information they want from the business systems. When they succeed, they use the information to quench their thirst making the company suffer losses.
References
ITech Security, (2013, June 10). Benefits of Security Systems for Businesses. Smallbizclub. Retrieved from http://smallbizclub.com/technology/hardware/benefits-of-security- systems-for-businesses/.
Laudon, K. C., & Laudon, J. P. (2000). Management information systems: Organization and technology in the networked enterprise. Upper Saddle River, NJ: Prentice Hall.
Lonnoff, J. (2015, January 10). 6 Biggest Business Security Risks and How You Can Fight Back. Cio.Com. Retrieved from http://www.cio.com/article/2872517/data-breach/6-biggest- business-security-risks-and-how-you-can-fight-back.html?page=2
Reddy, M. T. (1990). Securities operations: A guide to operations and information systems in the securities industry. New York, NY: New York Institute of Finance.