This report provides a comprehensive analysis of information system (IS) security and risk management practices within Telstra Corporation Ltd., a major telecommunications company in Australia. The report begins with an introduction to IS and its importance, followed by a detailed discussion of the most common malware affecting organizational operations, including adware, bots, bugs, and ransomware. It then identifies and describes three types of network devices used by Telstra: routers, Ethernet hubs, and modems, highlighting their vulnerabilities. The report assesses the reliability and availability of Telstra's web services, along with measures to ensure the confidentiality and integrity of staff emails using Microsoft Exchange Server. Furthermore, it prioritizes various threats, malware types, and security issues affecting web servers and webmail, such as computer viruses, phishing, email spoofing, and spamming. Two approaches for improving the availability of web and email servers, including the implementation of a Sender Policy Framework (SPF) and securing applications, are also presented. The report also explores the impact of organizational issues and human factors on IS management. Finally, it includes an illustration of log records, the utilization of audit log records for email and web server issues, and a discussion of five types of network security devices for controlling security, concluding with recommendations for improving Telstra's IS security posture.