In: Operations Management
Leveraging technology is a concept that is not going anywhere anytime soon. How does your organization guard against a breach of your personal information? Provide at least 2 examples and support them with evidence.
Compare and contrast your organization's approach to at least one other of your classmate's post.
With the advent of the internet, there are a number of advantages which are being enjoyed by both the individuals and the organizations. But at the same time, a number of challenges are also being imposed by the use of the internet. This risk is more increased when it comes to the unauthorised access and use of personal information of the individual.
This is the era of information and the most important asset of any individual is his or her personal information. The organizations contain a lot of personal information about their employees and thus it is their responsibility to protect this vital personal information from any kind of misuse or unauthorised access.
The following two methods are being utilized by my current organization in order to prevent any unauthorized use and access to the personal information:-
No use of the unencrypted device: My current organization does not allow any kind of unencrypted device to be used in the organization and it’s LAN. It is a common fact that the devices such as laptop or mobiles which are unencrypted are more prone to these kinds of attacks. Thus no private devices are allowed to be used in the network of the organization.
Automate security: The Company has the automated program installed on the server which regularly checks and verify the password settings, firewall and server configurations. This is quite helpful in reducing and overcoming the risk of misusing the vital information of the individuals.