SlideShare a Scribd company logo
1 of 1
;
One ofthe major concerns in relationto information
withina businessisthe risk of security.Probably the
most common securityrisk isVirusesand this is
because a viruscan infiltrate and infectcomputers
unbeknownstto the userof the computer. This has a
negative implicationon the company, Mega Media,
as whole as the trustworthinessofthe company wold
has beenlost with the users, resultingina decline in
the company’s popularity.An example ofa deadly
virus is Regin,a polymorphicvirus that mutates as
they pass through each compute,leavingsignatures
to deadly effect.
Backups are in place to add furthersecurity to filesof
importance for employees.Theyare obligedto save
all work employeesandbusinessescomplete atthe
endof the working day. Mega Mediawould needto
do this also, thisis because the filescan be damaged
or evenlost if inthe eventualityofthe computer
corrupting. This shows that the securityof the
informationmust be maintainedin order to continue
running the businessefficiently. MegaMediashould
have regular back-upswhich are daily or weeklyto
preventa large loss of data (back-upintervalsshould
dependon how much data isbrought into Mega
Media).
The safetyof informationis paramount to the success
of a businesssuch as Mega Media.Certain rulesand
regulationsare constantly put in place for employees
to abide by. For example,usinga chair comeswith
rulesand regulations,withinthe Health and Safety
Act passed. The Health and Safety Act is in place to
protect employeesfromharm, Mega Mediawill cover
all the proceduresof the act to ensure safetyto
employeesandinformation.The informationwill be
secure through backups, encryptionsoftware and
firewalls.
Mega Mediawouldneedto have a Business
Continuance Plan (BCP),to prepare for disaster.More
specifically,thisisa plan in case any aspect of IT fails,
potentiallyresultinginthe lossof information. In
order to prepare for possible disaster,the IT
departmentshould have backup systemsalready in
place inpreparation for natural disasters.Another
way the IT departmentcan maintain backups of
informationis through dual networks,ensuringthat if
one network fails,another will be available to use in
the meantime.
Mega Mediawouldfurther needto have a
contingencyplan put in place,beingdesignedas a
‘Plan B’ in preparation offuture events.Contingency
planningis an aspect of disaster recovery,healthand
safetyand risk management,furtherincreasing the
stabilityof the companies’information.Here is 4
stepsoutlinedfor an IT contingencyplan:
1. Conduct the businessimpact analysis
2. Create contingency strategies
3. Developan informationcontingencyplan
4. Ensure testing,trainingand exercisesare
carried out

More Related Content

What's hot

MISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanMISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery Plan
Jan Wong
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
amiable_indian
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
CincoC
 

What's hot (20)

Automated incident response
Automated incident responseAutomated incident response
Automated incident response
 
MISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanMISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery Plan
 
Tripwire IP360 Vulnerability Management
Tripwire IP360 Vulnerability ManagementTripwire IP360 Vulnerability Management
Tripwire IP360 Vulnerability Management
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
Transform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationTransform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and Orchestration
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Immune IT: Moving from Security to Immunity
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
 
L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)
 
SECURITY
SECURITYSECURITY
SECURITY
 
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableWhy Medical Devices Are So Vulnerable
Why Medical Devices Are So Vulnerable
 
Iinformation security
Iinformation securityIinformation security
Iinformation security
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
How to Secure Your Clinical Network
How to Secure Your Clinical NetworkHow to Secure Your Clinical Network
How to Secure Your Clinical Network
 
How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?
 
Safety management systems
Safety management systemsSafety management systems
Safety management systems
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
The smb dilemma
The smb dilemmaThe smb dilemma
The smb dilemma
 

Similar to M2 Poster IT

report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
JAYANT RAJURKAR
 
digital marketing
digital marketingdigital marketing
digital marketing
abdullahanwarabdulla
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
Fahd Khan
 
Discuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docxDiscuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docx
standfordabbot
 

Similar to M2 Poster IT (20)

How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Pci dss compliance for remote access during covid 19 pandemic article 1 with ...
Pci dss compliance for remote access during covid 19 pandemic article 1 with ...Pci dss compliance for remote access during covid 19 pandemic article 1 with ...
Pci dss compliance for remote access during covid 19 pandemic article 1 with ...
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
digital marketing
digital marketingdigital marketing
digital marketing
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Security Risk Solutions.pptx
Security Risk Solutions.pptxSecurity Risk Solutions.pptx
Security Risk Solutions.pptx
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
Discuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docxDiscuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docx
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
 

M2 Poster IT

  • 1. ; One ofthe major concerns in relationto information withina businessisthe risk of security.Probably the most common securityrisk isVirusesand this is because a viruscan infiltrate and infectcomputers unbeknownstto the userof the computer. This has a negative implicationon the company, Mega Media, as whole as the trustworthinessofthe company wold has beenlost with the users, resultingina decline in the company’s popularity.An example ofa deadly virus is Regin,a polymorphicvirus that mutates as they pass through each compute,leavingsignatures to deadly effect. Backups are in place to add furthersecurity to filesof importance for employees.Theyare obligedto save all work employeesandbusinessescomplete atthe endof the working day. Mega Mediawould needto do this also, thisis because the filescan be damaged or evenlost if inthe eventualityofthe computer corrupting. This shows that the securityof the informationmust be maintainedin order to continue running the businessefficiently. MegaMediashould have regular back-upswhich are daily or weeklyto preventa large loss of data (back-upintervalsshould dependon how much data isbrought into Mega Media). The safetyof informationis paramount to the success of a businesssuch as Mega Media.Certain rulesand regulationsare constantly put in place for employees to abide by. For example,usinga chair comeswith rulesand regulations,withinthe Health and Safety Act passed. The Health and Safety Act is in place to protect employeesfromharm, Mega Mediawill cover all the proceduresof the act to ensure safetyto employeesandinformation.The informationwill be secure through backups, encryptionsoftware and firewalls. Mega Mediawouldneedto have a Business Continuance Plan (BCP),to prepare for disaster.More specifically,thisisa plan in case any aspect of IT fails, potentiallyresultinginthe lossof information. In order to prepare for possible disaster,the IT departmentshould have backup systemsalready in place inpreparation for natural disasters.Another way the IT departmentcan maintain backups of informationis through dual networks,ensuringthat if one network fails,another will be available to use in the meantime. Mega Mediawouldfurther needto have a contingencyplan put in place,beingdesignedas a ‘Plan B’ in preparation offuture events.Contingency planningis an aspect of disaster recovery,healthand safetyand risk management,furtherincreasing the stabilityof the companies’information.Here is 4 stepsoutlinedfor an IT contingencyplan: 1. Conduct the businessimpact analysis 2. Create contingency strategies 3. Developan informationcontingencyplan 4. Ensure testing,trainingand exercisesare carried out