Jan 25, 2018 in Informative

Week 7 Discussion

With the increased use of the internet, extranets and intranets in businesses, the number of potential threats has increased. Some of the prime security problems that have emerged include hacking, denial of services, unauthorized data access and data alteration among others. As businesses are advancing in e-business and e-commerce activities, stakes are progressively becoming higher and the potential threats to vulnerability in their data systems is also increasing. Cyber crimes have increased in the recent past in the workplaces. So as solve such problems in the future, most businesses are investing heavily in the security of their data in the internet as well as the employees. Employees are requested to act professionally and uphold integrity in their workplaces. Businesses have continued to exercise more caution in areas such as firewalls, encryption, secure internet sites, disaster recovery plans, security monitoring and security awareness programs. Procedures and policies should be followed and compliance with such programs should be maintained and monitored (Bhusry, 2005).

Disaster recovery can be defined as a method that ensures an organization recovers from human caused as well as natural caused disaster that interferes with the computer-based operations. In a disaster recovery plan, the employees who will participate are specified and their respective duties, the type of hardware and software to be used as well as other facilities. Both disaster recovery plans and strategic plans help businesses to prepare for any disruptive events, either intentional or unintentional. Strategic planning helps an organization to define its strategy and make decisions on how to allocate resources in the various departments. In an organization, a disaster can occur any time hence it is wise for the organization to be prepared for disaster recovery. Strategic plan should help an organization to plan for uncertainties while disaster recovery plans helps an organization to do the actual recovery of the lost data (Phillips, 2009). 


Related essays