Security Challenges and Mitigation Procedures at Infosys

   

Added on  2023-03-30

5 Pages1201 Words322 Views
Hello,
We are now going to interview Mr. Steve Smith so that he can share his experience. Mr. Smith is
an IT professional who has huge about of expertise if numerous programming languages, at the
same time he has quality leadership skills which help his department of Infosys to address most
of the security challenges and workplace conflicts.
Question 1: What are the probable security challenges which Infosys faces in the recent
times? What are the mitigation procedures of security challenges? How did you
contributed to address the security questions? What were your decisive steps?
Smith: Security of data is one of the prime challenges faced by Infosys in the recent years. I
believe that social engineers are taking up new strategies in each of their recent data security
breaches which are a serious concern for our organization. The other security challenges faced
by Infosys are the investments in the facilities of developing country such as China as their
economic condition keeps on changing every moment. Our computers systems are fully secured
with latest security patches and we use only the secured organizational network which can be
very much useful to prevent the data security challenges. Business advisors in each country help
us to study the risks of investments in facilities as well. I believe that I have used my experience
to understand how the security breaches can be resolved; I even took orientation trainings so that
employees can be aware of data security issues. I believe that the use of encrypted message can
be very much useful to maintain the privacy of our business as well as financial records.
Security Challenges and Mitigation Procedures at Infosys_1
1
Question 2: What are the different categories of social media platforms used in Infosys?
What are the issue of using social media devices? Did you contributed to address the issues
coming from those platforms? Provide justification behind your stand.
Smith: Here, we use a wide range of social media platforms for different purposes such as
Facebook, Hangout, Instagram, and Whatsapp. Each of these platforms are used so that the
expectation of the consumers of this organization are understood in a detailed manner. The
strategic team of our organization follows all the conversations and creates new strategies. Our
relationship with the customers grew in the past couple of years as we started using these social
media platforms to communication with our clients. Both the internal stakeholders of our
business such as the floor manager as well as the external stakeholders our business such as the
service providers use these social media platforms for communication purposes. But in a way it
can be said that the use of these social media platforms also have some undesirable impact on the
overall growth and productivity of our organization as well. The prime limitation of these social
media platforms is the privacy of the employees. The social engineer might use the personal
information of or employees and use them for their own benefit. Excessive use of these social
media platforms can have significant undesirable impact on our employees as well in terms of
health issues such as stress and obesity.
However, I believe that I have played a significant role to address the drawbacks of these
social media platforms. My team has developed real time software where each of the project
activities can be tracked and managed by the team leaders without using the social media
platforms. We have found an alternative ways to communicate with our consumers as well using
Security Challenges and Mitigation Procedures at Infosys_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Novice Meets Expert
|18
|2728
|200

Policy Report on Social Media Surveillance
|11
|3037
|219

Privacy Concerns in Social Networking
|14
|3646
|377

Report: IT impact on Business
|9
|1851
|148

Privacy Issues of IoT
|14
|3402
|79

Privacy Threats to Big Data: Understanding the Challenges and Solutions
|15
|889
|163