Question

A new information security challenge for businesses is the use of personal phones by employees. What...

A new information security challenge for businesses is the use of personal phones by employees.

What are the problems associated with using personal phones in a business? If you were in charge of information security for a business what security measures would you want to implement?

Homework Answers

Answer #1

Q1) The problems associated with using personal phones in a business include -

1. Possible theft of crucial and client or business specific information or data which can be misused.

2. Distraction of the employees from work as they might use it regularly to check messages or take personal calls

Q2) The security measures that can be implemented for a business include -

1. Data security breach policies where any breach to data security would result in serious consequences on the employees

2. Avoiding theft of data by implementing data security and encryption softwares.

3. Avoiding personal phones at work to ensure data security and unwarranted passage of key information

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Hackers can pose threats to online businesses by using what to steal personal information and pass...
Hackers can pose threats to online businesses by using what to steal personal information and pass it on to third party criminals?
You are the new IT Manager for the Cougar Corporation, a firm of 500 employees, with...
You are the new IT Manager for the Cougar Corporation, a firm of 500 employees, with 5 buildings located in three different states. Much of the information is critical to the operation of the business and contains key customer information. As the new IT Manager, one of your employees comes to you concerned with the safeguarding of the firm's information. As you investigate this issue further, you too are concerned as it does not appear many methods of safeguarding the...
Step 1 Research security plans. Using course materials and the Internet, research various security plans. Use...
Step 1 Research security plans. Using course materials and the Internet, research various security plans. Use the following to guide your research: How do the security plans differ? In what ways are they alike? How can these plans be used to ensure the security of sensitive information? Step 2 Post your responses to the discussion board. Respond to the following and, if appropriate, include personal experience as part of your answers: What affects can an organization endure when a security...
Critical Essay about Stress: the constant challenge Analyze a health article about stress from the New...
Critical Essay about Stress: the constant challenge Analyze a health article about stress from the New York Times that richly describes an issue related to personal and community health. Write two pages, typed, double-spaced, twelve-point font size analysis of this article. In your analysis, include the main descriptions of the issues impacting personal and/or community health provided in the article, what data the author provides, how the information provided in the article relates to two concepts, and what further information...
The coronavirus is hitting businesses and their employees. Some businesses are still open and millions of...
The coronavirus is hitting businesses and their employees. Some businesses are still open and millions of employees are working to serve customers. Some of the employees work in their workplaces while some others work from home. Almost all employees worry whether they will lose their jobs or if they will have a pay cut. It is obvious that unemployment will rise because millions of employees will lose their jobs and the remaining employees may have a pay cut (10, 20,...
You work for a local company that sells and manages data security for small businesses in...
You work for a local company that sells and manages data security for small businesses in Minnesota and Wisconsin. This company sells security software, hardware encryption, and hosts secure servers for Internet transactions. Your company also stores customer data including TAX-ID numbers and bank accounts. As your company grows and tries to compete with the larger companies like IBM or Microsoft, your boss asks you to discover new ways of generating business. One idea you have is that you could...
Policing the workplace used to mean reminding employees about personal phone calls and making sure that...
Policing the workplace used to mean reminding employees about personal phone calls and making sure that paper clips did not disappear. But with the computer revolution at work that began in the 1990s, checking on employee behavior at work became considerably more technical. The threats to data security, not to mention other threats for potential lawsuits (e.g., sexual harassment), are now more complex as well. New federal laws pertaining to financial and medical records have put increased pressure on companies...
Inaccurate and unreliable information can spell financial disaster for businesses and persons who use this information...
Inaccurate and unreliable information can spell financial disaster for businesses and persons who use this information for decision-making purposes. From the standpoint of a business, accurate and reliable information is necessary in order for a potential investor to have when they are considering investing with the company. If the information is not accurate and reliable, this will potentially harm the investor. Inaccurate financial information may be due to the incompetence of the accountant who prepared the financial statements or due...
WEEK 4: NEW SECURITY MEASURES Consider your home, school, or current place of employment. What would...
WEEK 4: NEW SECURITY MEASURES Consider your home, school, or current place of employment. What would you do to increase your organization’s physical security? What do you think are the top three things to do in this realm? Try to think of the most cost-effective measures that would have the biggest impact. Does cost-effectiveness affect your top three things to do concerning security? (Please Text Format, No Pictures or Hand Written)
Systems analysis project 12: can you answer the 4 questions at the task section. Personal Trainer,...
Systems analysis project 12: can you answer the 4 questions at the task section. Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new “supercenter” in the Toronto area. Personal Trainer’s president, Cassia Umi, hired an IT consultant, Susan Park, to help develop an information system for the new facility. During the project, Susan will work closely with Gray Lewis,...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT