The main responsibility regarding the personal computers or business laptops security is borne by their owners. Manufacturers are spending their efforts and money to develop technologies that would allow better protection of the data on the electronic devices, however, it is up to the user when and how to use them. Some people simply pay little attention to the problem of data loss or data theft unless they face it personally. Negligent attitude to the issue of data security may lead to the consequences that emerged in the provided example.
In the case of a work laptop, the company may force its employees to adhere to the policy of data security and use company’s computers in a correct way. It may make employees obliged to safeguard computers, monitor the usage of devices as well as use data scanning. Special trainings may be held to educate employees how to ensure security of the usage and regularly check for viruses. It is believed it can prevent people from negligent attitude to the personal or non-employee usage of the computer. This all is highly important for avoiding such problems as proprietary information reveal or data theft.
The idea about protecting computer is known to everyone. Home PC also requires a great deal about protection as it faces almost same threats as a work laptop. The FBI suggests that every computer should follow some procedures in order to guarantee safe and secure usage. For example, in order to safeguard the computer, one should keep firewall turned on. It prevents hackers from having the chance to get access to information kept on this computer. Keeping in line with the latest updates of the antivirus systems can prevent installation of malicious software and uncontrollable transfer of information from the computer without the users’ being aware of it. Antispyware technologies are also designed to prevent the collection of information from the computer and transcending it to another computer. The updated operating system has built-in technologies to respond to the newest attacks on the security. It is advised to be highly attentive about what and where one downloads information. Some unreliable sources may add worms or other small viruses designed for collection of information. Finally, simply turning off the computer may ensure more security and safety compared to the state when the computer is always “ready for action” (“Scams & Safety,” n.d.). Turning off may end attacker’s connection to the computer and prevent hostile action.
Antivirus software requires special attention as it eliminates threats that have already been downloaded on the computer as well as detects potentially harmful software and content. Antivirus scans computer in search of programs that contain some virus “signatures.” It is highly important to scan the device as regularly as possible to ensure the highest level of protection. Moreover, the software itself should be updated in time due to high development of new viruses. It can search only for those virus patterns that are already in the data bases of the antivirus manufacturer. In the office, the company’s IT staff should be responsible for the provision of the antivirus of the highest quality, while employees should understand how regular checkups of USB sticks and new installations are important for the overall security (“Antivirus Software Helps Protect Data and Keep Your Machine Virus Free,” 2013).
Monitor of the usage of computer by employees may seem like interference into the employee’s personal space, however, this is a necessary measure to prevent any glitch or breaking into to the storage of important information. Without monitoring, employees can be the cause of the company’s catastrophe. Today monitoring has become a necessity rather than an optional draconian measure exercised by a few giant companies. It has become important to know what and how employees use their time and company’s resources. Robert Strohmeyer (2011) says that “unchecked Web activity can expose your network and systems to dangers from malware and other intrusions.” Moreover, it may reveal some important information regarding business strategy, customer data bases, data integrity and so on.
There are lots of special software that allows safe and quick monitoring and filtering. They are designed for small, middle and big businesses separately with a due regard to the needs each of them have. Moreover, they differ significantly in costs. However, dedicated IT staff can also provide careful selective monitoring. The best advice is to make such check-ups and regular monitoring. Employees should be aware that the content and operation of the computer is open to the monitoring staff, so being forthright with them is important. However, proactive filtering is also important for making monitoring effective in detection of the unauthorized usage.
However, training for employees that may help to change their attitude towards security and information safety is the most effective way to avoid data theft and date loss. They appeal to personal awareness and responsibility of every employee and make them refrain from such actions as letting a third person to use the computer or using it for the personal purposes. Moreover, trainings highlight the importance of having a reliable password and encryption devices. Leaving laptops in vehicles or public places must be also discussed and forbidden. Employees should understand that the laptop they use is still the property of the company and no personal changes should be made to its functioning. People should understand that the employee’s overall responsibility is in “doing what is reasonable and appropriate to prevent loss, theft, or other unauthorized use of the laptop” (Olzak, 2010), while refraining from action or procrastination that may lead to such outcome.
Taking into account the example of the employee who let so many opportunities for hackers to get access to the company’s laptop and intentionally violated some of the main policies regarding the use of the work computers, the conclusion is that he must be fined, if not dismissed. The employees should not allow any vulnerability to appear due to their misuse of the corporate organizational technologies. The way the company secures its information may show the way it provides its services.
References
Antivirus Software Helps Protect Data and Keep Your Machine Virus Free. (2013, May 31). Office of Information Technology. Retrieved from http://www.princeton.edu/oit/news/archive/index.xml?id=10277
Olzak, T. (2010, May 7). Protecting laptop Computers. Bright Hub. Retrieved from http://www.brighthub.com/computing/smb-security/articles/18944.aspx
Scams & Safety. (n.d.). FBI. Retrieved from https://www.fbi.gov/scams-safety/computer_protect
Strohmeyer, R. (2011, March 22). How to Monitor Your Employee’s PCs Without Going Too Far. PC World. Retrieved from http://www.pcworld.com/article/222169/how_to_monitor_your_employees_without_going_too_far.html