Good Essay About Technological Safeguards
Organizational information is one of the key aspect or key element in organizations running and as such, it is of great essence to ensure that this information is protected as much as possible so as to avoid unauthorized individuals from accessing it. Due to this fact, many organizations have taken precautions and ensured that their data has been effectively secured from unauthorized individuals. The provision of such security on information incurs the organization costs and it has been noted that some organizations have put a lot of finances on securing information and this has been one of the hindrances to organizational development as many think they secure information but in the real sense they waste funds .
One way, in which an organization can protect information, is by the use of Audit-Control Software. This software is designed to keep track of the activities in a computer so that auditors can spot suspicious activities and take action against them. All users either authorized or not, leave footprints that are electronic in nature that can be traced by auditors . This software is essential in creating an audit trail i.e. a record that reflects on those who have used the computer system and how they used it.
Even though securing information is an essential aspect of each organization, organizations should assess the importance of information they need to secure and the resources they have at their disposal and the amount of benefit the information brings to an organization . This is in reference to the first post. The Audit-Control Software is an expensive method of securing information and it should be applied by big organizations such as commercial banks. This post advocates for choosing a securing method that would benefit the organization having in mind the cost of attaining the security method, as well as the financial status of the organization.
The second post on the other hand overlooks at how passwords are taken for granted by many. Passwords are very essential and should be given to only those who are authorised to access the information. It is therefore essential that organization take this into account and give passwords in confidentiality to their staff only and ensure that non staff or unauthorised individuals do not get such passwords. This would play a major role to ensure that passwords offer security to information as required.
Company, D. P. (1994). Information Security and Privacy in Network Environments. London: DIANE Publishing Company.
David Wright, . G. (2008). Safeguards in a World of Ambient Intelligence. Oxford: Oxford Publishers.
Kirby, M. D. (2007). Safeguards in a Technological Society. Delhi: Blackwell Publishers.