Information security Essay
Most organizations today are adopting and integrating technologies in their production with an aim of improving production, efficiency, profitability and the competitive advantage in the market. This has been accelerated by the increasing globalization and innovation of new technologies which pose a major competitive threat to many organizations. Also, formulation of environmental standards as well as increased expectation on the standards and quality of goods and services by both the government and customers has also necessitated adoption of new technologies to ensure this is met.
New technologies in use today like the web 2. 0 and also the new internet as well as wireless technologies have led to increased efficiencies as well as increased productivity for most organizations. However, despite the advantages which accrue from introduction and use of new technologies in organizations, they pose major security threats to an organization. Data hijack by criminals as well as terrorism threats are some of the challenges that organizations are facing during new technology implementation processes (Bazelon, Choi & Canady, 2006).
Security issues in regard to new technologies implementation in an organization Security is a top concern for most business since it may lead to destruction of a company’s reputation thus affecting the competitiveness of an entity. With increased globalization and increased terrorist threats, security risks have increased posing a major threat to most organizations. One of the major threats that companies face while implementing information technologies are the risk of losing or protecting sensitive data.
Information technologies especially via internet and other wireless technologies are accessible globally which poses a major threat to an organization. Organizations hold private and sensitive information regarding their employees, production processes and also marketing strategies which are vital for competitive advantage. However, with technology implementation, and the dynamism in technology, such data may be accessed by unauthorized individuals causing a business great harm in terms of profitability. This also exposes the employees as well as an organization’s customers’ at risk of fraudulent activities via technologies.
Information security experts insist that just like information networks operate or cross borders with no regard for the provincial and national boundaries, also security vulnerabilities and threats pass in the same way thus necessitating greater and stern security measures to ensure that the threats are minimized (Hinojosa, 2005). Another threat that organizations are facing is terrorist attacks and threats. Currently, there are many terrorist groups which operate globally and they employ high technologies to carry out their tasks and to harass businesses and employees as well as the customers.
An increase in global terrorist organizations in the world that are connected via the new technologies poses a major security threats to most organizations in the world. Terrorists may not only be interested with soliciting the financial and production processes of an organization, but also the structural and day to days activities of an organization with an aim of identifying weak areas or points which could be used to attack an organization. This is made possible by new technologies which enable then to tamper the security measures taken by an organization to ensure that it is protected (Sussman, 2008).
Phishing and data mining is also another information security risk that is faced by organizations during implementation of technologies in an organization. Phishing refers to the unauthorized use of personal information of another person which is obtained through networks. It also involves alteration of an individual’s computer software with an aim of obtaining the computer owner’s personal information by scrupulous individuals and for the purposes of defrauding the person or harming their reputation or career.
With implementation of new technologies in an organization, the entity is enabled to sell its goods and services online and all the transactions are carried without having to meet the customer or the client. While making the payments, a client gives his private financial data depending on the mode of payment which he or she uses. Computer criminals have a way of tampering with or gaining access of such information which they can manipulate to make purchases while pretending to be the clients.
The business thus faces a risk of being sued by a client on such grounds and for lack of adequate protection measures. This has increased the cost of implementing technology especially with different cases of security breach being reported today. Organizations are supposed to ensure that the private information of their clients and employees are well protected and that their privacy is upheld despite the cost this may involve (Ena, 2008). Risk of loss of important documents by an organization has also been a major security issue while implementing information technology.
Apart from the risk of terrorist threats and phishing, an organization also faces the risk of losing vital information through dangerous programs such as the viruses which are transmitted via the internet and other networks. If such programs find their way to the computers and other technologies in a company, a company may risks losing most of its vital information as these programs corrupts the whole network system in an area. This could be dangerous for and organization as it may lead of reduced productivity, increased costs and reduced earnings (Blankespoor, 2005).
With increased awareness of information security threats increasing in the world, the attackers have changed their tactics posing even a major threat to an organization. Most of the attackers are usually professional information technologists who invent new methods of accessing data from an organization despite the security measures taken. As mentioned earlier, technology is changing at a very high speed and so are the security threats to an organization. The dynamism of technology is a risk which cost organizations heavily as they try to keep pace with it.
While implementing new technologies, organizations are also faced with the problem of testing the validity of the technology. Most of the cases involving security breach end up being the problem in an organization. IT companies exonerate themselves by arguing that lack of adequate security policies in an organization are the major causes of any cost that an organization may incur (Wallace, Lusthaus. & Kim, 2005). Conclusion Information technology is a major strategy that has enabled most of the businesses to perform well in terms of growth and expansion.
New technologies have been on high demand in the recent past especially as most organizations go global which necessitates networking. Technology improves the efficiency, effectiveness and the overall productivity of an entity. However, it poses major threats to the privacy of a company as well as its clients and employees. Stern security measures should be taken to ensure that technology implantation in an organization does not turn out to be more costly. This can be done though formulation of technology security policies and procedures to ensure privacy is upheld.
University/College: University of Chicago
Type of paper: Thesis/Dissertation Chapter
Date: 25 September 2016
Let us write you a custom essay sample on Information security
for only $16.38 $13.9/page