There are many different type of IT problems, which an organization will have to address, but it is important to note that an effective security plan starts with the management team. The management team has to be committed to developing a workforce trained to handle different types of security threats. The process starts with management developing a strong security policy, which explains which security is important, provides guidelines for meeting industry standards and complying with government regulations and it must provide a clear outcome of what will happen when an employee does not comply with the policy. Management should also provide a central leader who will provide command and control for the entire security requirement listed in …show more content…
There are many hosting companies available, these services range from maintaining “websites and e-mail servers, service providers for various telecommunication connections, disaster recovery companies for co-location capabilities” (Harris, 2013) Cloud computing is the next big thing, its various management services while cutting done on operational cost for IT, but it comes at a price. What an organization saves in cost in the short term can end up blowing a hole in the operational budget in the long term. All organization who use cloud computing services need to take into account risk, because the responsibility for management the resources can be outsource but the risk still remind. The better approach might be to invest more into the present IT infrastructure and remains in control of with the in house IT …show more content…
Mobile devices are essential portable computer systems, they use the internet to process and store information. While GFI can manage it employees personal mobile devices, it should through policy state that official business must only be conducted over GFI authorized devices. On authorized mobile devices, GFI policy must state that all mobile phone need to be encrypted and have a SIM lock password on it. Laptop computer must also use encryption to prevent data from being access when it is lost or stolen. additionally, these type of devices should have the ability to be remotely wiped and the ability to be located by global positioning satellite (GPS). This combination will be effective in preventing GFI sensitive information from ending up in the wrong