StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security awareness - Article Example

Cite this document
Summary
The company manufactures and sells technology, hardware and equipment. Threats from inside the company continue to be the main source of information security breaches, and therefore effective security awareness…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Security awareness
Read Text Preview

Extract of sample "Security awareness"

Security awareness campaign Dell is an American private Company with headquarters in Texas. The company manufactures and sells technology, hardware and equipment. Threats from inside the company continue to be the main source of information security breaches, and therefore effective security awareness campaign targeting the employees of the company can help identify and prevent threats like social engineering and phishing. Threats have continued to emerge from within the company due to inadequate awareness on issues targeting security among the workers in the company.

Organizing a security awareness campaign will ensure the employees are informed and updated on various security issues that are vital in protection of the company’s resources. Security awareness campaign will aim at creating an environment that is secure in order to protect the organization and clients from breaches (McGovern, 52). The campaign will target creation of awareness and will incorporate the use of topical posters, online general awareness courses, newsletter, videos, email campaigns and forums.

The goal of the campaign is to ensure reinforcement of security best practices. The campaign will target all the departments in the organization. The topics to be covered during the training entails email safety, mobile security, physical security, passwords and access control, importance of individual responsibility, definition of key cyber security terms, phishing, social engineering, data protection and destruction, threats and virus protection, internet safety, federal information and security management act together with demonstration of practical examples of vulnerability and security threats.

The campaign and training will target one department at a time with an intention of ensuring all the departments are covered. At the end of the training the employees should be able to avoid breaches, pass audit requirement for compliance, create a secure environment for the organization, practice and learn secure habits and gain awareness of vulnerabilities and information security threats. The employees will be observed after the training period to assess the impact of the program (McGovern, 54).

Work cited McGovern, M. Opening Eyes: Building Company-Wide IT Security Awareness. IT Prof. 4.3 (2009): 52-54. Web.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security awareness Article Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1676821-security-awareness
(Security Awareness Article Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1676821-security-awareness.
“Security Awareness Article Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1676821-security-awareness.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security awareness

Developing the Corporate Strategy for Information Security

The paper "Developing the Corporate Strategy for Information security" discusses that the operational duties of digital forensic professionals include securing the data from various system vulnerabilities so that it does not get manipulated and the integrity of the investigation remains intact.... Accordingly, CISO needs to analyze the potential threats associated with various crucial information of the organization that might hamper the interests of the organization on the whole or that of its stakeholders (Whitman & Mattord, 2010; Homeland security, 2007)....
6 Pages (1500 words) Assignment

Security Planning of a City

There has to be a substantial improvement in vigilance, intelligence gathering and situational awareness.... security assessment has to encourage the development of sophisticated and creative technologies.... This Center has to collaborate with the Department of Homeland security Centers of Excellence.... Further, the preparedness of the nation as a whole in order to counter threats to the homeland has also to be investigated by it (Department Of Homeland security Centers). In this endeavor, attention has to be given to the provision of gas masks to the public and the shortcomings in tackling terrorist attacks, natural calamities and emergencies has to be ascertained....
8 Pages (2000 words) Essay

Current Status of Security Awareness

It is, however, currently involved in the review of several information security awareness models for the purpose of doing just that.... hellip; th the aforementioned organizational objective in mind, this research will critically review the information security awareness construct for the purpose of potentially contributing to the design of the said model/program. Effective information security starts with the basics Therefore, perspectives and items that represent information security awareness should meet basic operational or user-level information security concerns....
4 Pages (1000 words) Essay

Internet Security: Awareness is Key

Finally, an analysis and concluding portion would emphasize awareness as the key factor to abate threats in security.... This essay is written to serve the following objectives: (1) to identify the security threats and vulnerabilities; (2) to present the nature of internet security; and (3) describe security and risk management in the light of impending threats in internet security.... By presenting… he risks that organizations face in advanced technological communications structures, one would be made aware of the factors that expose enterprises to network security breach. The origins of the internet dates back to as early as 1960s....
15 Pages (3750 words) Essay

Define a Remote Access Policy to Support Remote Health Care Clinics

Programs of security awareness are designed in such a way to sensitize users on organization's security policy.... security awareness education to the employees does not only focus on giving them access to information of the organization.... ecurity awareness training (Security Policy)security awareness training focuses on employees' familiarization with the security policy of a particular organization.... The security policy of organizations sets specific standards on how business information systems are protected from both external and internal threats....
2 Pages (500 words) Essay

Access Controls

It allows users to understand and analyze the security awareness level and avoid any future mishaps that will disrupt business flows.... om/three-steps-to-building-a-successful-security-awareness-program/Tipton, H.... ? As society progresses to 21st security, the concept of security becomes a critical element in a very advanced world.... As a matter of fact, intelligent readers are one of the most crucial elements that provide all the inputs to control physical security....
2 Pages (500 words) Coursework

Meeting for business ideas

This initiated the idea to create a mobile application known as SecureIT, to protect and promote IT security awareness online users in the course of their transactions.... This report discusses… It discusses the online security challenges that lead to the need for technological advancement.... Different organizations are aware of the online security threats.... The other online security challenge relates to the faults and miscommunication between the servers and the clients....
4 Pages (1000 words) Coursework

Security Awareness Training Plan for MEMATECH Solutions Limited

The paper "security awareness Training Plan for MEMATECH Solutions Limited " discusses that the continuous monitoring process of the physical access would enable the system administrators to implement various procedural controls over each access point of the 'Physical Security Perimeter(s)'.... Moreover, the proposed identity management and security awareness training plan would also suggest a set of effective ways of applying patches and fixes to MEMATECH along with various exercises associated with improving auditing and maintaining the security of the overall systems as well as communication networks within the organization....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us