Solved

IT Security

Posted on 2014-02-21
5
305 Views
Last Modified: 2014-09-02
IT security is central to the successful of an information systems in any businesses. Organisations that have many hardware choices, including the type of computers, processing power, memory, network equipments, storage and backup. Understanding the capabilities of hardware and the options available can save companies million of dollars. Discuss why it is also important for users or non-IT professionals to have knowledge of IT security.
0
Comment
Question by:YaYangTeah
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 50

Expert Comment

by:Don Johnston
ID: 39879165
This sounds like a homework question.
0
 
LVL 35

Expert Comment

by:Kimputer
ID: 39880026
That's because humans are the weakest link in the security chain. To reduce risks on different fields:

- Educating the user on how to use/keep passwords. Complexity/length. Repetition on other platforms (don't use same password on other systems) etc etc.
- Educating the user on surfing behaviour (clicking on popups that look like an antivirus screen) etc
- Educating the user on emailing behaviour (think before clicking on links or attachments, even from strangers, and emails in foreign languages).

When education is proper, the reliance on expensive software (while still needed, it means the hard to catch 0-days and drive by exploits are less of a concern, as the speed of the updates of any security package lags a bit when a new widespread exploit is in the wild, while it's still being analysed by the companies)
0
 
LVL 27

Expert Comment

by:tliotta
ID: 39880044
Can you describe the business problem and business environment around this question? Or if it's an academic question, please identify it as such. The two types of questions require different responses from any participating experts.

Tom
0
 

Author Comment

by:YaYangTeah
ID: 39880072
That is the academy question, I posted it here because I would like to learn more from here ,I know here have many experts, so I can hear from different experts ideas
0
 
LVL 25

Accepted Solution

by:
madunix earned 500 total points
ID: 40251752
Understanding various current threats and can help you to avoid to becoming a victim of Phishing, Pharming, Fraud Emails, Viruses/Trojans, ATM Type Fraud..etc.

Those are some good points for education:
- Use a unique password or PIN and change it regularly. You should never disclose your password or PIN to anyone
- Be very suspicious of any e-mail or phone call received from a business or person that asks for your password, passport number, account or credit card information unless you have initiated the transaction.  
- Maintain different passwords for multiple services
- Always use anti-virus software. Keep anti-virus software up-to-date.
- Ensure that your browser and operating system are up to date and security patches application
..etc.

http://www.bankersedge.com/pdf/pdfs/customer_information_security.pdf
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
local DNS vendor. 4 75
Creating a Vendor Admin user 23 118
PCI Scan on IIS Remediation not working 1 110
Mask & unmask data in journal 6 72
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that A…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question