logo

Data Security: Steps to Protect Organizations from Hackers

   

Added on  2022-11-16

4 Pages842 Words267 Views
Running head: DATA SECURITY
DATA SECURITY
Name of Student
Name of University
Author’s Note

DATA SECURITY1
What can organizations do to protect themselves from hackers looking to steal account
data?
Organizations can undertake numerous steps for the purpose of protecting their
business from multiple hackers who aspire to steal account data (Rahman, Daud &
Mohamad, 2016). Some of the steps that could be undertaken by organizations include
keeping their systems up to date, not revealing their data to any unauthorized user or an
outsider. Some more steps include they must always authenticate as well as verify the user
who tends to access the data, implement policies that could help them as well as employees in
securing their account data (Rahman, Daud & Mohamad, 2016). One of the most crucial step
that should be provided more concentration include securing the organizational website, this
would it only secure the account data that belongs to the customers but also help organization
in preventing any sort of data leak internally or externally.
What would you do to continually monitor your information systems to ensure that data
is secure?
For the purpose of monitoring the information system continuously in order ensure
that data is secured, numerous indicators like output indicators, objective indicators, activity
indicators that had been established in the framework must be accessed or measured in the
entire process (Rao & Selvamani, 2015). Secondary data, as well as checklists, should be
utilized to measure various activity indicators regularly. For the purpose of monitoring output
as well as objective indicators, numerous samples of households that had received support
besides which baseline data is accessible would be chosen (Thompson, Ravindran & Nicosia,
2015). After that, they would be interviewed at specific periods with the use of proper tools
for monitoring that are available in the framework to measure indicators.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ICT Ethical Hacking Exploits
|11
|2470
|1

Issues in Social Media for Children
|9
|2284
|53

IT Security Policy
|6
|1484
|28

Australian Computer Society
|4
|822
|99

Theories of Ethics: Just Consequentialism, Utilitarianism, and Deontology in Information Ethics
|4
|731
|141

Doing Ethics Technique Assignment Sample
|6
|1450
|110