Preview

Building a Secure Organization

Powerful Essays
Open Document
Open Document
11027 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Building a Secure Organization
Building a Secure Organization
John Mallery
BKD, LLP
Chapter 1
It seems logical that any business, whether a commercial enterprise or a not-for-profit business, would understand that building a secure organization is important to longterm success. When a business implements and maintains a strong security posture, it can take advantage of numerous benefits. An organization that can demonstrate an infrastructure protected by robust security mechanisms can potentially see a reduction in insurance premiums being paid. A secure organization can use its security program as a marketing tool, demonstrating to clients that it values their business so much that it takes a very aggressive stance on protecting their information.
But most important, a secure organization will not have to spend time and money identifying security breaches and responding to the results of those breaches.
As of September 2008, according to the National
Conference of State Legislatures, 44 states, the District of
Columbia, and Puerto Rico had enacted legislation re quiring notification of security breaches involving personal information.
1 Security breaches can cost an organization significantly through a tarnished reputation, lost business, and legal fees. And numerous regulations, such as the Health
Insurance Portability and Accountability Act (HIPAA), the
Gramm-Leach-Bliley Act (GLBA), and the Sarbanes-Oxley
Act, require businesses to maintain the security of information.
Despite the benefits of maintaining a secure organization and the potentially devastating consequences of not doing so, many organizations have poor security mechanisms, implementations, policies, and culture.
1. OBSTACLES TO SECURITY
In attempting to build a secure organization, we should take a close look at the obstacles that make it challenging to build a totally secure organization.
Security Is Inconvenient
Security, by its very nature, is inconvenient, and the more robust the

You May Also Find These Documents Helpful

  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Tags: sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Ensure a Safe Workplace

    • 337 Words
    • 2 Pages

    ABC chemicals is a medium size chemical distributor located at the rear of a large metropolitan shopping precinct. ABC Chemicals purchase large quantities of cleaning chemicals. These are delivered in 205 liter drums and include solvents, acids and other corrosives, and detergents. These products are decanted by ABC chemical’s staff into retail size containers (not exceeding 30 liters/kilograms) , re-labelled and shipped in company-badged delivery vehicles to retail outlets throughout the metropolitan area.…

    • 337 Words
    • 2 Pages
    Good Essays
  • Better Essays

    There are several things a manager has to consider when running a business. He or she must ensure that the company does what it needs to meet the needs of the customer, the employees, and protect all personal information. One way is to ensure that there are proper security measures to protect all data by making sure the employees are trained and understand the security protocols. Another way is by using the Systems Development Life Cycle (SDLC) method to help maintain the systems they have or need to conduct business. Businesses that follow the steps in the SDLC method and maintain a good information security system will keep the trust of its customers ensuring it remains profitable.…

    • 2427 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Security Awareness

    • 1637 Words
    • 7 Pages

    The Brightington Academy Change Management Plan specifies actions to handle all changes affecting resources, costs, and time. Also, the Change Management Plan concentrates on how the Brightington Academy project will…

    • 1637 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Software systems and centralized databases containing the sensitive of an organization have become the norm in society. Because this information includes the private information of the organization and the consumer, the organization has a responsibility to have the necessary security measures in place to stop attacks as well as have the necessary expertise to provide an effective response in the event of the AIS system failing. The management should be held responsible for ensuring…

    • 851 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A low-cost strategy that is aimed at driving down costs in all functions usually fares best in more formal structure with more conservative norms, which gives managers greater control over the activities of an organization’s various departments.…

    • 1959 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Gershon, D., & Straub, G. (2011), Empowerment: The Art of Creating Your Life as You Want It. SterlingEtbos.2011.c.256p..…

    • 1452 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    There are several ways that you can contribute to a safe and secure environment being maintained.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ensure a Safe Workplace

    • 2166 Words
    • 9 Pages

    The Occupational Health and Safety Regulations 2007 are made under the Act. They specify the…

    • 2166 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Irrespective of their actual position, any individual who assumes responsibility in these areas will be considered to be accountable for their actions.…

    • 1212 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    There are countless steps that can be taken to safeguard a company’s data systems against intrusions; however, our collaborative discussion stressed three. Our team reviewed the benefits of updating POS…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The path for risk management and the security panels consumed by a corporation are offered by information security strategy and architecture, which is very important to any companies and organizations. The security architecture would need to define the way that obligation would be accomplished in the numerous regions of the corporate. Furthermore, the security architecture must report past activities that have affected the company’s information properties. These incidences designate areas that may need larger safekeeping controls. Fresh intimidations may compel differences in the security design and supplementary controls. The safekeeping design must also integrate with the current technology substructure and postulate assistance in inaugurating the appropriate risk controls needed for the corporate to accomplish its business firmly.…

    • 1522 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Djamaludin Ancok ancokmm@yahoo.com ancokpsi@ugm.ac.id Creating the Resilient Organization: Lesson 1 To survive and prosper in a turbulent environment requires operating as self-organizing and self-renewing system. Unleashing the forces of self-organization and self-renewal requires operating according to a different set of management “conditions.”…

    • 1046 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Ultimate Shield Security Agency, Incorporated is a security agency established by Domingo Partido, having served in the military as a Military attaché during his teen years, he was then inspired to establish a security agency years later in the late 1980’s as he had a background in such things. In 1989, USASi – Ultimate Security and Allied Services, Inc. was born and it began its operations in the same year. Aside from the Metro Manila Head Office, Ultimate Shield was able to branch out into two other regions – one in La Union, covering the northern Luzon area and one branch in Surigao Del Norte, covering the lower region of the country.…

    • 1907 Words
    • 8 Pages
    Powerful Essays