Integrated Professional Skills in the Digital Age
VerifiedAdded on 2022/12/27
|12
|3688
|1
AI Summary
This report analyzes the integration of professional skills in the digital age, including the evaluation of technologies used by businesses. It explores the benefits and disadvantages of Zoom and Microsoft Teams for virtual meetings and communication. The report also discusses cloud storage and computing, privacy and security challenges, and measures to address them.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Integrated
professional skills in
the digital age
professional skills in
the digital age
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
Integrated professional skills in the digital age...............................................................................1
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Evaluation of technologies used by businesses...........................................................................3
Cloud storage and computing......................................................................................................5
Privacy and security challenges related to online services and their measures...........................8
CONCLUSION..............................................................................................................................11
REFERENCES..............................................................................................................................12
Integrated professional skills in the digital age...............................................................................1
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Evaluation of technologies used by businesses...........................................................................3
Cloud storage and computing......................................................................................................5
Privacy and security challenges related to online services and their measures...........................8
CONCLUSION..............................................................................................................................11
REFERENCES..............................................................................................................................12
INTRODUCTION
Digital technology is defined as electronic handling, generation and processing of data.
The use of various digital tools has not only improved learning but are also contributing
significantly in business processes (Varghese and Buyya, 2018). Recent situations of Covid 19
pandemic are managed by companies with the help of emerging digital technologies. Without
integration of digital tools it could have impossible for service providers to continue their
operations. This report will provide an analysis of two such applications which supported
business during pandemic situations. It will also discuss various aspects of cloud computing
which has become an integral part of the world. This report will also provide a critical evaluation
of all privacy concerns and related measures associated with digital technology.
MAIN BODY
Evaluation of technologies used by businesses
Zoom:
It is a video conferencing application which is widely used by organisations to conduct
meetings or interaction when teams are working from remote locations.
Features and suitability: This app features both audio and video mode so that live
communication as well as recording sessions can be conducted. During pandemic situation it
emerged as one of the most effective tool to conduct virtual meetings in business as well as
education sector. Zoom app can host large conferences with ancillary, advanced and basic
features so that high quality audio and videos can be delivered on cloud services. Its output
quality is not affected by number of participants (Subramanian and Jeyaraj, 2018). The
application also provides features such as virtual background, waiting rooms to enhance security
and integration of calendar. The app also allows sharing screen at any moment between multiple
users. When work from home has became a new trend virtual background and ‘touch up my
appearance’ features allow users to improve their appearance in the video conference. The
application also has features such as HTTP access, unlimited voice over internet protocol, hybrid
Digital technology is defined as electronic handling, generation and processing of data.
The use of various digital tools has not only improved learning but are also contributing
significantly in business processes (Varghese and Buyya, 2018). Recent situations of Covid 19
pandemic are managed by companies with the help of emerging digital technologies. Without
integration of digital tools it could have impossible for service providers to continue their
operations. This report will provide an analysis of two such applications which supported
business during pandemic situations. It will also discuss various aspects of cloud computing
which has become an integral part of the world. This report will also provide a critical evaluation
of all privacy concerns and related measures associated with digital technology.
MAIN BODY
Evaluation of technologies used by businesses
Zoom:
It is a video conferencing application which is widely used by organisations to conduct
meetings or interaction when teams are working from remote locations.
Features and suitability: This app features both audio and video mode so that live
communication as well as recording sessions can be conducted. During pandemic situation it
emerged as one of the most effective tool to conduct virtual meetings in business as well as
education sector. Zoom app can host large conferences with ancillary, advanced and basic
features so that high quality audio and videos can be delivered on cloud services. Its output
quality is not affected by number of participants (Subramanian and Jeyaraj, 2018). The
application also provides features such as virtual background, waiting rooms to enhance security
and integration of calendar. The app also allows sharing screen at any moment between multiple
users. When work from home has became a new trend virtual background and ‘touch up my
appearance’ features allow users to improve their appearance in the video conference. The
application also has features such as HTTP access, unlimited voice over internet protocol, hybrid
cloud services, and full screen view and group messaging features. It allows users to have more
interactive experience of conferences.
Advantages: Zoom is very easy solution for virtual conferencing which can be easily connected
on multiple platforms such as desktop, mobile and room systems. Its user interface is very simple
yet provided with enterprise level features such as virtual meetings, online training and video
conferences. It’s pricing very affordable at both large and small scale making it popular among
various users (Giaquinto, 2021). Another advantage of this application is that it is highly flexible
and can even work on slow connection because it uses cloud servers which can even provide
good quality at low bandwidth. Zoom is centralised platform in which users can also participate
in live chats even during conversations making it more interactive.
Disadvantages: Increasing demand and user load is making Zoom services quite slow in addition
to unsatisfactory customer services. The biggest disadvantage of the application is that its
security is easily affected by intrusion from unauthorised parties. The passwords can be easily
hacked and thus business data is at great risk. The application lacks one key feature that it does
not allow to delete any inappropriate comment. Thus several behavioural and code of conduct
issues are faced by employers and other users.
Microsoft teams
This application functions as communication hub by features such as chatting, file
sharing and conference calls. Thus it reduces the email communication within companies and
provides a more interactive platform to the firms.
Features:
Microsoft teams can easily collaborate with the office documents and thus users do not
have to switch apps. This application also allows sharing and creating within dashboards so that
feedbacks can be taken. For allowing the safety of user data Microsoft teams features various
security enhancements. Along with the online meetings application also has features of instant
messaging, Emojis and stickers. The users can make private as well as group discussions. The
application also allows file sharing, conversation tracking and contact search (15 benefits of
Microsoft Teams, 2021). Team application fosters communication greatly because it permits real
interactive experience of conferences.
Advantages: Zoom is very easy solution for virtual conferencing which can be easily connected
on multiple platforms such as desktop, mobile and room systems. Its user interface is very simple
yet provided with enterprise level features such as virtual meetings, online training and video
conferences. It’s pricing very affordable at both large and small scale making it popular among
various users (Giaquinto, 2021). Another advantage of this application is that it is highly flexible
and can even work on slow connection because it uses cloud servers which can even provide
good quality at low bandwidth. Zoom is centralised platform in which users can also participate
in live chats even during conversations making it more interactive.
Disadvantages: Increasing demand and user load is making Zoom services quite slow in addition
to unsatisfactory customer services. The biggest disadvantage of the application is that its
security is easily affected by intrusion from unauthorised parties. The passwords can be easily
hacked and thus business data is at great risk. The application lacks one key feature that it does
not allow to delete any inappropriate comment. Thus several behavioural and code of conduct
issues are faced by employers and other users.
Microsoft teams
This application functions as communication hub by features such as chatting, file
sharing and conference calls. Thus it reduces the email communication within companies and
provides a more interactive platform to the firms.
Features:
Microsoft teams can easily collaborate with the office documents and thus users do not
have to switch apps. This application also allows sharing and creating within dashboards so that
feedbacks can be taken. For allowing the safety of user data Microsoft teams features various
security enhancements. Along with the online meetings application also has features of instant
messaging, Emojis and stickers. The users can make private as well as group discussions. The
application also allows file sharing, conversation tracking and contact search (15 benefits of
Microsoft Teams, 2021). Team application fosters communication greatly because it permits real
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
time chatting option among team members within selected topic channel. The users can access
this application from any remote location as it eradicates the restrictions of software or hardware
preferences. The app is supported on various platforms such as son Mac, Windows, Android and
iOS.
Benefits: The biggest advantage of Microsoft teams is that it is highly secure and meets all
industry regulations for allowing multiple integrations. The security features include multi factor
authentication, data encryption as well as real time transport protocol so that data is protected.
The app also provides centralised location with feature to file share so that documents can be
easily shared among teams and over conference calls. Even the remote locations of users permit
each of the users to access the team resources and to communicate with each other (Abdel-
Basset, Mohamed and Chang, 2018). Another advantage of using Microsoft team is that it allows
integration with various project management, office and survey applications. Thus business
capabilities can be easily increased without compromising the security standards. The application
is compliant with industry specific as well as global standards like HIPAA, SOC,GDPR AND
FERPA. The application is easy to implement and enhances team productivity and focus on
work.
Disadvantages: The first disadvantage of this chatting app is that it does not have unified chat
which means that users are not able to find any particular data from conversations. Team creation
can also clog up huge memory space in the organisational server. This becomes more critical if
company is operating from remote and multiple locations. In addition to these Microsoft teams
also sets limitations for number of channel a user can become part of. The parent company of the
application also provides some specific applications for individual features of team app. For
example Microsoft itself provide Skype app for interaction and messaging platform which in turn
compete with the Microsoft team (Kumar, Raj and Jelciana, 2018). The file structure of
application is quite complex and can make it hard for the users to understand it. Further
application has limited flexibility in terms of replicating team structures. Thus even in situations,
if organisations wants to create duplicate team manual operations are required which seem to be
counterproductive.
this application from any remote location as it eradicates the restrictions of software or hardware
preferences. The app is supported on various platforms such as son Mac, Windows, Android and
iOS.
Benefits: The biggest advantage of Microsoft teams is that it is highly secure and meets all
industry regulations for allowing multiple integrations. The security features include multi factor
authentication, data encryption as well as real time transport protocol so that data is protected.
The app also provides centralised location with feature to file share so that documents can be
easily shared among teams and over conference calls. Even the remote locations of users permit
each of the users to access the team resources and to communicate with each other (Abdel-
Basset, Mohamed and Chang, 2018). Another advantage of using Microsoft team is that it allows
integration with various project management, office and survey applications. Thus business
capabilities can be easily increased without compromising the security standards. The application
is compliant with industry specific as well as global standards like HIPAA, SOC,GDPR AND
FERPA. The application is easy to implement and enhances team productivity and focus on
work.
Disadvantages: The first disadvantage of this chatting app is that it does not have unified chat
which means that users are not able to find any particular data from conversations. Team creation
can also clog up huge memory space in the organisational server. This becomes more critical if
company is operating from remote and multiple locations. In addition to these Microsoft teams
also sets limitations for number of channel a user can become part of. The parent company of the
application also provides some specific applications for individual features of team app. For
example Microsoft itself provide Skype app for interaction and messaging platform which in turn
compete with the Microsoft team (Kumar, Raj and Jelciana, 2018). The file structure of
application is quite complex and can make it hard for the users to understand it. Further
application has limited flexibility in terms of replicating team structures. Thus even in situations,
if organisations wants to create duplicate team manual operations are required which seem to be
counterproductive.
Cloud storage and computing
Cloud computing is defined as the deployment of computing services like database,
storage, intelligence and software analytics and servers over the internet. Users are required to
pay only for the services or resources they are using with increased flexibility, economies of
scale, lower cost and improved infrastructure. Various types of cloud computing services which
are used by organisations are as follows:
IaaS: It is known as ‘infrastructure as a service’ in which servers, virtual machines, operating
system, network storage and other IT infrastructure elements are used on the basis of pay-as-you-
go.
PaaS: In ‘platform as service’ cloud is applicable for users which require on demand supply of
environment so that they can develop, test and manage software applications (Palvia and et.al.,
2018). Thus it makes very convenient for users to quickly build new mobile applications without
concerning about setting up new IT infrastructure. Thus it is highly suitable for the users which
need improvement in software applications.
SaaS: ‘Software as a service’ is applicable for users who demand subscription basis or on
demand method for providing software applications over internet.
Cloud computing storage and services allow users to develop and scale applications on
different mobile, web based or API platforms. As cloud infrastructures can be scaled easily they
helps businesses in lowering the time and cost involved in application development. Data
volumes are very huge and thus for managing and analysing data service users need to protect
data across various locations. It makes it suitable for the users to access data from remote
locations as well and to easily use artificial intelligence and machine learning concepts for
making informed decisions (5 essential characteristics of cloud computing, 2021). In this digital
era where companies are not limited to only one geographical locations cloud storage services
allow service users to manage and access data from remote locations in secure manner.
Advantages:
When businesses shift from the traditional ways to advanced IT solutions provided by
cloud storage then this technology provide following benefits:
Cloud computing is defined as the deployment of computing services like database,
storage, intelligence and software analytics and servers over the internet. Users are required to
pay only for the services or resources they are using with increased flexibility, economies of
scale, lower cost and improved infrastructure. Various types of cloud computing services which
are used by organisations are as follows:
IaaS: It is known as ‘infrastructure as a service’ in which servers, virtual machines, operating
system, network storage and other IT infrastructure elements are used on the basis of pay-as-you-
go.
PaaS: In ‘platform as service’ cloud is applicable for users which require on demand supply of
environment so that they can develop, test and manage software applications (Palvia and et.al.,
2018). Thus it makes very convenient for users to quickly build new mobile applications without
concerning about setting up new IT infrastructure. Thus it is highly suitable for the users which
need improvement in software applications.
SaaS: ‘Software as a service’ is applicable for users who demand subscription basis or on
demand method for providing software applications over internet.
Cloud computing storage and services allow users to develop and scale applications on
different mobile, web based or API platforms. As cloud infrastructures can be scaled easily they
helps businesses in lowering the time and cost involved in application development. Data
volumes are very huge and thus for managing and analysing data service users need to protect
data across various locations. It makes it suitable for the users to access data from remote
locations as well and to easily use artificial intelligence and machine learning concepts for
making informed decisions (5 essential characteristics of cloud computing, 2021). In this digital
era where companies are not limited to only one geographical locations cloud storage services
allow service users to manage and access data from remote locations in secure manner.
Advantages:
When businesses shift from the traditional ways to advanced IT solutions provided by
cloud storage then this technology provide following benefits:
Cost and speed: Cloud computing does not require any need to set up any additional hardware or
software. Thus it can manage infrastructure in a very cost friendly manner. Also it is possible for
the business owners to use cloud services on demand which makes business operations very
quick and flexible.
Global scale: As with rising opportunities most of the companies are planning to operate
globally cloud computing allows them to scale elastically. Thus on geographical basis business
can observe best use of IT resources such as adjustments in band width, storage and power.
Performance and productivity: On site data centres require huge setup for hardware and software
as well as time taking management chores. However cloud computing eliminates all these needs
so that productivity can be improved by focusing more on organisational goals. In addition to
this to boost performance cloud storage services also upgrade data centres so that network
latency can be reduced and performance can be improved (Silva, Khan and Han, 2018). Cloud
storage data provides more reliable and cost effective solution for fast data recovery and back up.
Competitive benefits: Cloud storage allows on demand self services and thus gives benefit or
quick deployment and resilient computing. Its features of unlimited storage capacity, secure
collaboration of remote locations allows companies to optimise the benefits of data handling.
Also with cloud computing software integrations is automatic so companies can scale easily in
secure manner as per business demand. Another benefit of using cloud storage is that it allows
multi tenancy and API access with advanced security features for data so that business
virtualisation can be preceded with ease.
Disadvantages:
As every technology has certain limitations cloud computing also suffers from some
disadvantages. Some key disadvantages of cloud computing is as follows:
Limited control and features: Since cloud computing gives more power to organisations or users
it can be difficult for the businesses that have poor in house IT support. Such organisations may
fail to handle cloud related issues and thus technology can lead to negative outcomes for them.
Also users may receive limited and popular features of cloud depending upon the version they
are using (Čolaković and Hadžialić, 2018). Thus if service provisions are not employed properly
software. Thus it can manage infrastructure in a very cost friendly manner. Also it is possible for
the business owners to use cloud services on demand which makes business operations very
quick and flexible.
Global scale: As with rising opportunities most of the companies are planning to operate
globally cloud computing allows them to scale elastically. Thus on geographical basis business
can observe best use of IT resources such as adjustments in band width, storage and power.
Performance and productivity: On site data centres require huge setup for hardware and software
as well as time taking management chores. However cloud computing eliminates all these needs
so that productivity can be improved by focusing more on organisational goals. In addition to
this to boost performance cloud storage services also upgrade data centres so that network
latency can be reduced and performance can be improved (Silva, Khan and Han, 2018). Cloud
storage data provides more reliable and cost effective solution for fast data recovery and back up.
Competitive benefits: Cloud storage allows on demand self services and thus gives benefit or
quick deployment and resilient computing. Its features of unlimited storage capacity, secure
collaboration of remote locations allows companies to optimise the benefits of data handling.
Also with cloud computing software integrations is automatic so companies can scale easily in
secure manner as per business demand. Another benefit of using cloud storage is that it allows
multi tenancy and API access with advanced security features for data so that business
virtualisation can be preceded with ease.
Disadvantages:
As every technology has certain limitations cloud computing also suffers from some
disadvantages. Some key disadvantages of cloud computing is as follows:
Limited control and features: Since cloud computing gives more power to organisations or users
it can be difficult for the businesses that have poor in house IT support. Such organisations may
fail to handle cloud related issues and thus technology can lead to negative outcomes for them.
Also users may receive limited and popular features of cloud depending upon the version they
are using (Čolaković and Hadžialić, 2018). Thus if service provisions are not employed properly
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
then it may restrict the advantages provides by cloud services. Also business becomes dependent
upon cloud provider thus in certain situations quality and services may not be satisfactory.
Bandwidth issues and no redundancy: Cloud servers are not backed up and thus they are not
redundant. Thus to avoid any critical situations users may be required to implement a
redundancy plan which has additional cost (Dennis and Harrison, 2020). Also ineffective storage
planning and insufficient amount of server can cause bandwidth issues
Security concerns: During cyber attacks it is possible that internet connectivity is lost at the end
of cloud service provider. It can result in unwanted downtime affecting entire business process.
As end user does not have control over the application and data if websites or data of cloud
service providers are attacked then business and data of users is also at risk of security and
privacy breach.
Inadequate support: Cloud computing is very dynamic and changes rapidly. Thus it may require
shifting business from one provider to other. It not only causes financial burden but can also
make it difficult for organisations to understand and properly deploy the features of new cloud
services. It can have negative impact on business operations.
Privacy and security challenges related to online services and their measures
With quick integration and demand of social distancing due to Covid pandemic most of
the service users have began to use social media applications, digital payment and learning tools
as well as online platforms provided by service providers. Similarly organisations are also using
various digital applications for managing their global operations and effective data handling.
However it has also encouraged the risk of different security and privacy concerns. The data of
individuals and businesses is at great risk of hacking and cyber threats. The key challenges which
are faced by companies in providing online services are as follows:
Malware and phishing attacks:
These are most common threats for the organisations and service users. Malware is
intrusive software which causes unauthenticated access of private data of an individual. Similarly
phishing also involve fraudulent attacks in which information is acquired by a third party without
consent and knowledge of user (Ferrag and et.al., 2018). As most of the organisations are storing
upon cloud provider thus in certain situations quality and services may not be satisfactory.
Bandwidth issues and no redundancy: Cloud servers are not backed up and thus they are not
redundant. Thus to avoid any critical situations users may be required to implement a
redundancy plan which has additional cost (Dennis and Harrison, 2020). Also ineffective storage
planning and insufficient amount of server can cause bandwidth issues
Security concerns: During cyber attacks it is possible that internet connectivity is lost at the end
of cloud service provider. It can result in unwanted downtime affecting entire business process.
As end user does not have control over the application and data if websites or data of cloud
service providers are attacked then business and data of users is also at risk of security and
privacy breach.
Inadequate support: Cloud computing is very dynamic and changes rapidly. Thus it may require
shifting business from one provider to other. It not only causes financial burden but can also
make it difficult for organisations to understand and properly deploy the features of new cloud
services. It can have negative impact on business operations.
Privacy and security challenges related to online services and their measures
With quick integration and demand of social distancing due to Covid pandemic most of
the service users have began to use social media applications, digital payment and learning tools
as well as online platforms provided by service providers. Similarly organisations are also using
various digital applications for managing their global operations and effective data handling.
However it has also encouraged the risk of different security and privacy concerns. The data of
individuals and businesses is at great risk of hacking and cyber threats. The key challenges which
are faced by companies in providing online services are as follows:
Malware and phishing attacks:
These are most common threats for the organisations and service users. Malware is
intrusive software which causes unauthenticated access of private data of an individual. Similarly
phishing also involve fraudulent attacks in which information is acquired by a third party without
consent and knowledge of user (Ferrag and et.al., 2018). As most of the organisations are storing
their data digitally their valuable business secrets and information is at great risk of theft. It not
only results in financial frauds but also to great damage to personal and business records of
service providers and their customers.
Spam attacks: Today most of the companies are involve in digital marketing and processing.
Thus if spam information is posted on behalf of any organisation then it can have adverse impact
on operational and market survival. With access to multiple service providers users have become
more prone to this type of attacks because their personal information is shared among third
parties without their consent.
Cross site scripting: For all web based applications this threat is one of the key challenges. Some
malicious codes target web browser of user and result in compromised data, unauthorised storage
of user’s information in the form of cookies. It can also include sensitive information such as
credit card numbers, passwords and bank details (Čolaković and Hadžialić, 2018). Thus while
making online purchases or communication users must remain aware and protected of such
information stealing threats.
Identity clone attacks: For hackers it is very easy to access information of any users and then to
create a fake profile or application using stolen information. The trustworthy image of cloned
user can be easily used to conduct online frauds and information stealing of related stakeholders.
This not only causes financial losses and violation of personal details but can also have adverse
impact on brand image of service providers.
Information and location privacy threat: Almost everyone in the world is using digital
technology by one or other mean. However lack of proper security measures and violation of
data protection acts make it easy to steal the sensitive information of an individual. This
information includes passwords, credit credential, personal details as well as business sensitive
data. The stolen information can be easily used to conduct frauds and social crimes as well.
Measures for dealing with security threats on online platforms:
For fully utilising benefits of digital technology and information and to avoid privacy
threats several measures must be taken by the service providers and individuals. Some of the key
recommended solutions are:
only results in financial frauds but also to great damage to personal and business records of
service providers and their customers.
Spam attacks: Today most of the companies are involve in digital marketing and processing.
Thus if spam information is posted on behalf of any organisation then it can have adverse impact
on operational and market survival. With access to multiple service providers users have become
more prone to this type of attacks because their personal information is shared among third
parties without their consent.
Cross site scripting: For all web based applications this threat is one of the key challenges. Some
malicious codes target web browser of user and result in compromised data, unauthorised storage
of user’s information in the form of cookies. It can also include sensitive information such as
credit card numbers, passwords and bank details (Čolaković and Hadžialić, 2018). Thus while
making online purchases or communication users must remain aware and protected of such
information stealing threats.
Identity clone attacks: For hackers it is very easy to access information of any users and then to
create a fake profile or application using stolen information. The trustworthy image of cloned
user can be easily used to conduct online frauds and information stealing of related stakeholders.
This not only causes financial losses and violation of personal details but can also have adverse
impact on brand image of service providers.
Information and location privacy threat: Almost everyone in the world is using digital
technology by one or other mean. However lack of proper security measures and violation of
data protection acts make it easy to steal the sensitive information of an individual. This
information includes passwords, credit credential, personal details as well as business sensitive
data. The stolen information can be easily used to conduct frauds and social crimes as well.
Measures for dealing with security threats on online platforms:
For fully utilising benefits of digital technology and information and to avoid privacy
threats several measures must be taken by the service providers and individuals. Some of the key
recommended solutions are:
Privacy settings: With the usage of digital applications one must always read privacy policies so
that they are aware of fact that to what extent personal information is shared and used. Many
sites demands for unnecessary information such as credit card passwords, location and other
personal information which must not be shared with any third party.
Antispyware and antivirus: The systems or mobile applications must be protecting software
which can detect and protect from viruses and spywares (Kumar, Raj and Jelciana, 2018). One of
the reasons for increasing cyber attacks during virtual working of business in pandemic time is
that that most of the employees working from home did not give attention to antivirus scanning.
Thus this protecting software must be installed and upgraded regularly.
Safe practices: The organisations must ensure that their employees are aware of the security
threats and they take all necessary measures to protect. For instance strong passwords must be
used to minimise the unauthenticated access. Further users must also limit the personal or
sensitive information they save on online platforms. Individuals must not click on suspicious
links or emails. With virtual or remote working along with compute system or laptop people are
also working on mobile devices. However they usually forget to secure these mobile devices.
Thus it is equally important to use secure passwords and software updates on mobile as well.
Virtual private network (VPN): Organisations can use these private networks so that anonymity
can be maintained. It will prohibit the storage of personal information on online tools and thus
privacy concerns are resolved.
Using encrypted platforms: With remote working organisations must ensure that they have use
of data encryption so that their sensitive information is not leaked to any third party and only
authenticated users are allowed to decode the information.
Regular security audits and use of private Wi-Fi: The use of public Wi-Fi can also become one
of the reasons for increased vulnerability of privacy threats. Thus service users or employees
must not use public network because they does not have encrypted traffic. Instead secure VPN
connections must be used. The organisations must conduct security check and information
technology audits to ensure that all systems and software are updated and capable to protect
information from the suspicious threats (Varghese and Buyya, 2018). With security audit service
that they are aware of fact that to what extent personal information is shared and used. Many
sites demands for unnecessary information such as credit card passwords, location and other
personal information which must not be shared with any third party.
Antispyware and antivirus: The systems or mobile applications must be protecting software
which can detect and protect from viruses and spywares (Kumar, Raj and Jelciana, 2018). One of
the reasons for increasing cyber attacks during virtual working of business in pandemic time is
that that most of the employees working from home did not give attention to antivirus scanning.
Thus this protecting software must be installed and upgraded regularly.
Safe practices: The organisations must ensure that their employees are aware of the security
threats and they take all necessary measures to protect. For instance strong passwords must be
used to minimise the unauthenticated access. Further users must also limit the personal or
sensitive information they save on online platforms. Individuals must not click on suspicious
links or emails. With virtual or remote working along with compute system or laptop people are
also working on mobile devices. However they usually forget to secure these mobile devices.
Thus it is equally important to use secure passwords and software updates on mobile as well.
Virtual private network (VPN): Organisations can use these private networks so that anonymity
can be maintained. It will prohibit the storage of personal information on online tools and thus
privacy concerns are resolved.
Using encrypted platforms: With remote working organisations must ensure that they have use
of data encryption so that their sensitive information is not leaked to any third party and only
authenticated users are allowed to decode the information.
Regular security audits and use of private Wi-Fi: The use of public Wi-Fi can also become one
of the reasons for increased vulnerability of privacy threats. Thus service users or employees
must not use public network because they does not have encrypted traffic. Instead secure VPN
connections must be used. The organisations must conduct security check and information
technology audits to ensure that all systems and software are updated and capable to protect
information from the suspicious threats (Varghese and Buyya, 2018). With security audit service
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
users must also receive training for protected use of web based services. It will help them to
identify the potential security threats and to encourage safe internet use practices.
CONCLUSION
It can be concluded from the above sections that amid the pandemic situations when
businesses are forced to emphasis more on virtual or remote working digital technologies must
be adopted wisely. In order to make business operations successful and progressive suitable
applications must be chosen which meet the business objectives. It has been also analysed that
for maintaining business infrastructure cloud computing technology is vital. Thus its limitations
and applications must be applied effectively. However with tremendous advantages digital
technologies are also accompanied with some privacy concerns. Thus organisations must
conduct regular audits and protection measures so that such security concerns can be addressed
and benefit of technology can be explored.
identify the potential security threats and to encourage safe internet use practices.
CONCLUSION
It can be concluded from the above sections that amid the pandemic situations when
businesses are forced to emphasis more on virtual or remote working digital technologies must
be adopted wisely. In order to make business operations successful and progressive suitable
applications must be chosen which meet the business objectives. It has been also analysed that
for maintaining business infrastructure cloud computing technology is vital. Thus its limitations
and applications must be applied effectively. However with tremendous advantages digital
technologies are also accompanied with some privacy concerns. Thus organisations must
conduct regular audits and protection measures so that such security concerns can be addressed
and benefit of technology can be explored.
REFERENCES
Books and Journals
Abdel-Basset, M., Mohamed, M. and Chang, V., 2018. NMCDA: A framework for evaluating
cloud computing services. Future Generation Computer Systems. 86. pp.12-29.
Čolaković, A. and Hadžialić, M., 2018. Internet of Things (IoT): A review of enabling
technologies, challenges, and open research issues. Computer Networks. 144. pp.17-
39.
Dennis, M. and Harrison, T., 2020. Unique ethical challenges for the 21st century: Online
technology and virtue education. Journal of Moral Education. pp.1-16.
Ferrag, M.A., and et.al., 2018. Blockchain technologies for the internet of things: Research
issues and challenges. IEEE Internet of Things Journal. 6(2). pp.2188-2204.
Kumar, P.R., Raj, P.H. and Jelciana, P., 2018. Exploring data security issues and solutions in
cloud computing. Procedia Computer Science. 125. pp.691-697.
Palvia, S., and et.al., 2018. Online education: Worldwide status, challenges, trends, and
implications.
Silva, B.N., Khan, M. and Han, K., 2018. Internet of things: A comprehensive review of
enabling technologies, architecture, and challenges. IETE Technical review. 35(2).
pp.205-220.
Subramanian, N. and Jeyaraj, A., 2018. Recent security challenges in cloud
computing. Computers & Electrical Engineering. 71. pp.28-42.
Varghese, B. and Buyya, R., 2018. Next generation cloud computing: New trends and research
directions. Future Generation Computer Systems. 79. pp.849-861.
Online
15 benefits of Microsoft Teams, 2021. [Online]. Accessed through < https://ungoti.com/blog/15-
benefits-microsoft-teams/ >
5 essential characteristics of cloud computing, 2021. [Online]. Accessed through
<https://www.business.att.com/learn/tech-advice/5-essential-characteristics-of-cloud-
computing.html >
Giaquinto, R., 2021. Pros and Cons of Using Zoom, Keeping Businesses and Events Going.
[Online]. Accessed through < https://www.greengeeks.com/blog/pros-cons-using-
zoom/>
Books and Journals
Abdel-Basset, M., Mohamed, M. and Chang, V., 2018. NMCDA: A framework for evaluating
cloud computing services. Future Generation Computer Systems. 86. pp.12-29.
Čolaković, A. and Hadžialić, M., 2018. Internet of Things (IoT): A review of enabling
technologies, challenges, and open research issues. Computer Networks. 144. pp.17-
39.
Dennis, M. and Harrison, T., 2020. Unique ethical challenges for the 21st century: Online
technology and virtue education. Journal of Moral Education. pp.1-16.
Ferrag, M.A., and et.al., 2018. Blockchain technologies for the internet of things: Research
issues and challenges. IEEE Internet of Things Journal. 6(2). pp.2188-2204.
Kumar, P.R., Raj, P.H. and Jelciana, P., 2018. Exploring data security issues and solutions in
cloud computing. Procedia Computer Science. 125. pp.691-697.
Palvia, S., and et.al., 2018. Online education: Worldwide status, challenges, trends, and
implications.
Silva, B.N., Khan, M. and Han, K., 2018. Internet of things: A comprehensive review of
enabling technologies, architecture, and challenges. IETE Technical review. 35(2).
pp.205-220.
Subramanian, N. and Jeyaraj, A., 2018. Recent security challenges in cloud
computing. Computers & Electrical Engineering. 71. pp.28-42.
Varghese, B. and Buyya, R., 2018. Next generation cloud computing: New trends and research
directions. Future Generation Computer Systems. 79. pp.849-861.
Online
15 benefits of Microsoft Teams, 2021. [Online]. Accessed through < https://ungoti.com/blog/15-
benefits-microsoft-teams/ >
5 essential characteristics of cloud computing, 2021. [Online]. Accessed through
<https://www.business.att.com/learn/tech-advice/5-essential-characteristics-of-cloud-
computing.html >
Giaquinto, R., 2021. Pros and Cons of Using Zoom, Keeping Businesses and Events Going.
[Online]. Accessed through < https://www.greengeeks.com/blog/pros-cons-using-
zoom/>
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.