Common Security Planning Organizations

Common Security Planning Organizations

https://geniusproessays.com/

Common Security Planning Organizations:

WEEK 3 Discussion Board and Peer Responses

· The discussion assignment requires an Original Posting (main post) from you of 2-3 paragraphs answering the module’s question.

·

· Discuss the types of common security planning organizations use to help defend against cyberattacks.

·

· In addition to your main post, you must post three responses to other posts made by your classmates.

PEER 1

Nowadays, cyberattacks are a continuously and rapidly growing problem, and it is one of the most significant threats to organizations today. If we are not aware how to use social media, devices connecting to the internet like laptops, computers, and cellular phones we might be victims of this what we call cybercrime. These cyberattacks might put you in danger as well as the organization you are working with if we do not follow these following steps below.

Limit Employee Access to Your Data & Information

Limiting access to your valuable company data reduces the chance for human error, which is the number-one information security threat. Employees should only have access to the systems and specific information they need to do their jobs.

If an employee leaves your company, or transfers to a different company location, take protective action immediately, including deleting passwords and accounts from all systems and collecting company ID badges and entry keys.

Install Surge Protectors & Uninterruptible Power Supplies

Uninterruptible power supplies (UPS) can give you enough battery life and time to save your data in the event of a power disruption. Check to ensure the UPS type and size meets your company’s standards and requirements.

Every computer and networked device should be plugged into a UPS. For less-sensitive electronics and non-networked equipment, standard surge protectors should suffice. Be sure to test and replace each UPS and surge protector as recommended by the manufacturer.

Patch Your Operating Systems & Software Regularly

Every new app can open the door to a cyber-attack if you do not regularly patch and update all software on every device used by your employees.

Always check for updates when purchasing a new computer or installing a new software system. Be aware that software vendors are not required to provide security updates for unsupported products.

Install & Activate Software and Hardware Firewalls

Firewalls can thwart malicious hackers and stop employees from browsing inappropriate websites. Install and update security system systems on every employee computer, smartphone, and networked device.

Set up Web & Email Filters

Use email and web browser filters to deter hackers and prevent spam from clogging employee inboxes. You can also download “blacklist” services to block users from browsing risky websites that pose malware risks.

Caution your employees against visiting sites that are frequently associated with cybersecurity threats, such as pornographic websites or social media. This may seem like an easy decision; but it only takes one employee to visit the wrong website to inadvertently download malware onto your company systems.

Use Encryption for Sensitive Business Information

Use full-disk encryption to protect all your computers, tablets, and smartphones. Save a copy of your encryption password or key in a secure location separate from your stored backups.

Dispose of Old Computers & Media Safely

Before donating or trashing old computers, you need to wipe all valuable hard drive information. Delete any sensitive business or personal data on old CDs, flash drives, or other old media.

Train Your Employees

Cyber-vigilant employees are your best protection against information security threats.

Every employee should know:

· What business and personal use is permitted for emails

· How to treat business information at the office or at home

· What to do if a cybersecurity incident occurs

Now we familiarize ourselves with the steps on how to be safe, how to prevent and how to help defend ourselves as well the organization from threat or cyber-attacks. We must practice these steps and be vigilant with all actions that we are going to execute. We must think twice and be extra careful dealing with the internet.

Ausherman, Nicole. “How to Protect Your Business from Cyber Attacks.” NIST, 22 Oct. 2019, www.nist.gov/blogs/manufacturing-innovation-blog/how-protect-your-business-cyber-attacks .

 

 

PEER 2

D3 Ben Alberti – Computer Experience

 

Although vaguely related, my first real experience with more complex computer systems and coding was about 10 years ago when the Raspberry Pi was first released. My dad, being a software engineer for a large company, wanted to spark my interest in it and that was when I first started learning Javascript as well. Although I’ve all but forgotten most of the concepts directly related to them, it was still a nice bonding experience! I still have my Rapberry Pi from all those years ago.

I have always been big into computers before and since then, and faced the dillema a few years later of buying my first computer outright, or taking the time to build it. I opted to build it with the help of my dad, thinking it would be a good learning experience, as I had never really fully understood how modern PCs function, and it would be way more cost efficent as opposed to ordering a pre-built. I was right, and even though I was pretty nervous it would work after finishing the build, it did. Just this past year, as I am now living on my own I had to get a new PC, and build it all on my own this time, from which parts to order, all the way to assembly.

 

PEER 3

 

Abler- W3 Discussion Computer Experience

 

Good Morning!

 

I chose to discuss my computer experience for this week’s topic. To be honest I do not have much. I know it may be cliche but I was born in the 90s and was raised by grandparents so there was very little change with technology in my house as the wold developed. My first experience taking technology apart was with VCR’s and gaming consoles, which I am unsure if you could really classify those as computer experience. Although, I have always been the go to person in my family for setting up new consoles and making sure everything was plugged in and hooked up properly so that it was accessible (ie. DVRs/cable, game consoles, wifi etc.).

When it comes to computer software I try to start by trying to figure it out for myself; but to be honest I am a better student than I am an acute individual when it comes to technology. So, I have always relied on watching tutorial videos or DIY manuals where I have to take one step at a time while watching someone else do it. Unusually though, after learning something I am able to repeat the steps pretty easily for myself for future needs. A recent example is when I was getting everything ready for school; I had received an email about needing windows for some of my classes.I have a MacBook so it runs IOS not windows, however there was a link for how to use with an ios system. I could not for the life of me, figure out how to make it work. I watched several videos and had gone through all the steps that was necessary to allow me to install and run a virtual machine box to allow windows; it still didn’t work for me. I finally caved and took my computer to best buy to see if they could help, there I found out that there was a software program that was no longer supported for mac and that was why I was having so much difficulty. They told me that they could do it for me but I would need to install “Parallels” which requires a yearly subscription and that it would take them 24-72 hours as it will require a whole software update and install. They quoted me over $100 to complete this I said thank you, took my computer, went home and found the parallels program they were talking about. I paid the subscription and took the 10 minutes to install it myself. Now my Mac runs both IOS and Windows without problem, for the fraction of time and cost that BestBuy had quoted.

The most I have in coding experience is copy and pasting Myspace code back in the day haha.

"Order your paper and get Zero AI and 100% plagiarism free professional written paper now!"

Order Now