Security Basics (Part Seven) Security Basics (Part Seven) INFORMATION SECURITY AND BUSINESS

Posted by Thomas Davon on

People would try to do anything to get their ways around rules and laws. It is quite saddening that no matter how good a law is and no matter how much it tries to protect the interest of people, there will always be people who would want to boycott those laws to have their selfish interest served. This attitude of boycotting procedures and laws can also be observed in information security and as a matter of fact, it is quite on the rise. With the recent shift from a centralized mainframe computing and data processing to the use of distributed network of desktops, laptops etc, information security has become a little more difficult than it used to be prior to this shift. Network perimeters have turned out more porous than before because of the use of Personal Digital Assistants (PDAs) and other recent portable devices. These devices have made it a lot more straightforward working from the home.

With remote accesses to networks on the increase plus an increasing numbers of easily accessible endpoint devices, the chances of breaking into a server or network has also increased. This makes stealing information from organizations a lot easier. With the internet currently serving as the largest market in the world and providing business owners with better opportunities to reach out to their customers and clients without spending so much. Online communications are made easy and business online also is made easy. However, the internet exposes organizations to hackers and thefts, thereby making stealing or corrupting of data easier as well. As Information Technology advances so do criminals in their attempts to steal information and possibly sell or tamper with them. They would use sophisticated hacker tools to get what they want from any organization with vulnerabilities in their security system.  Because of this, organizations must also seek for better and safer ways of using the internet in their businesses.

0 comments

Leave a comment

Please note, comments must be approved before they are published