In: Computer Science
Managing IT security and risks Information security is critical in the development and implementation of information systems in organizations. Assume that you are developing a customer relationship management system for Morita Loan, list five methods that you can use to protect the data in such a system and discuss how you can implement these five means for information security.
Five methods to protect data in a CRM system:
1. Physical IT infrastructure:
Number one method of data protection is to keep it safe by protecting the overall infrastructure and customer's data in it. It is very essential to make sure that not everyone has network access and a firewall is also installed. Antivirus software should be used and should be kept updated.
Operating systems should be updated regularly. An encryption software can help prevent data breaches.
2. CRM Provider reliability:
The number one CRM provider would be where security of the software is ensured. Requested data should be given unlimited access and there should be strict standards of data. The dealings should be transparent as well.
3. Employee training:
Employees should be trained as well on how to use certain equipment and prevent breaches. There are different scenarios where training is the best method to make all staff aware of the breaches, dangers, and security risks. Then they should be trained on how to deal with such circumstances and prevent them in the first place.
4. Passwords:
One has to be very smart with the kinds of passwords they select. If someone hacks your password, the problem becomes more pertaining to security. They can steal any kind of data. Passwords should be complex, strong, long, etc. It should not be written in insecure places and should be prevented from being stolen.
5. Monitoring:
Regular monitoring of CRM activity is very important. It is sometimes not possible to monitor all the time, but an alert system can be set where each time a pattern is identified, the system will send an alarm.
All these five means are easy to implement in information security. Information security deals with protecting data related to electronics and printers. Such systems can be protected by setting up proper passwords, preventing their misuse by educating employees, and with regular monitoring of the system.