Tuesday, April 30, 2019

EBusiness and Ethics Essay Example | Topics and Well Written Essays - 500 words

EBusiness and Ethics - Essay ExampleThe growth and advancement of computer technology and some(prenominal) networks have encouraged an incline in the number of criminal activities propagated over the computers as well as risks (Jamrich and Dan Oja 28). The world is currently witnessing the development of new criminal activities that are being committed through the digital world. in that locationfore, there is a greater need of coming up with measures and strategies that can help curb cyber risks.There are many establishment administrators and skilled enough to do the work and provide what the client need. However,it is sturdy to find the one that can do what you want with the right way and beneficial and effective for longsighted time. The biggest problem that companies face is the protective cover in the network. The info and information are crucial to a ac guild that is why they need security. In these days, there are many viruses that can harm the computers and destroy the data in companies and it cost them lots of money and gives them a bad reputation. The project will provide and stage set up data security to the carrell mobilises that helps to secure the data and protect it from threats and viruses (Siegel 31). Furthermore, there is need for security from the outside network. Also, the cell phones should have protection from viruses that destroy and might consequently steal data. Nowadays, every company needs to setup a security program and the only way to do it is to hire system administrators to do that with the right way. What the project intend toset up is the required security for the data and cell phone. Further, the data will be backed up because it is better to have backed up data in case it is lost or destroyed. Setting up security for the data and cell phone will include activating the firewalls, blocking any spyware attacks, as well as using effectual malware software or anti-virus. Protection of data entails using encryption for t he most sensitive files such as the financial records, tax returns, and backing up the significant

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.