Introduction
Security is a vital aspect to look at in business environment in order for the organizations and their clients have advantages in using information technologies. This paper will show processes to keep information secure, give security hints and discuss the importance of security in a company.
Step-by-step process
This paper will use a guide by to design a guide. According to , there are seven processes for better security which are used to come up with three steps.
You should identify what you are protecting in category of hardware, software, and personnel. Knowing them, an employee will be able to protect them.
Step two: identify the threats
After identifying the assets, one should identify threats that attack the assets such as viruses, physical threats, and malicious codes, among others.
Step three: keeping information and data safe
Since the employees are now aware of threats that attack information and data, they should know the list of making that information safe such as backing up information, entering strong passwords among others. Also, using internet safely by using computers with firewall.
Security hints
According to , there are tips for creating strong passwords which include:
- Using strong passwords without using any of your and using all characters in a password including lower cases, upper cases, symbols and numerical.
- Using long passwords of at least eight characters
- Don’t use names which are in dictionary due to vulnerable attack of dictionary attacks.
- Changing password frequently may be after three months
- Not sharing password
Importance of information security
Security is an important to benefit both employees and the company in that; it ensures confidentiality of information about employees on their records and also the company on investment strategies. Also, information security ensures that data is of integrity that is no unauthorized change to be made for crucial safety and financial data. It also ensures availability of information for both employees and the company such their records are not tempered with. It ensures continuity of business in the company in achieving their goals.
References
Microsoft. (n.d.). Security Guide for Small Business: Enhance your computer and network security today. microsoft corporation.
Pesante, L. (2008). Introduction to Information Security. Retrieved from http://www.us-cert.gov/sites/default/files/publications/infosecuritybasics.pdf