1 / 9

ICT in running a small business.

ICT in running a small business. Amy McCarthy. Customer data storage. The most convenient way to store customer data is electronically. It is much safer and easier than storing it physically.

hedia
Download Presentation

ICT in running a small business.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ICT in running a small business. Amy McCarthy

  2. Customer data storage. • The most convenient way to store customer data is electronically. It is much safer and easier than storing it physically. • However, you need to follow the data protection act that was formed to refer to data controllers and data subjects.

  3. The data protection act. • The data protection act consists of 8 sections, you need to make sure you meet all of these requirements. • Fairly and lawfully processed- cannot collect data for one purpose, then use it for another without the permission of the subject. • Processed for registered purposes- if you intend to send data to another company it must register with the Information Commissioner. • Adequate, relevant and not excessive- irrelevant data should be deleted. • Accurate and up to date- organisation must take steps to ensure data is accurate.

  4. Continued • Not kept longer than is necessary- data held for any identified purpose must be removed once the purpose has been met. • Processed in line with your rights- data subjects may have the right to inspect data held on them. They have the right to as for inaccurate data to be corrected. • Secure- you need security to prevent unauthorised access to the data. Backup copies should be taken so your data is protected against loss. • Not transferred to countries without adequate protection- personal data cannot be transferred to countries outside the EU unless the country has an adequate level of protection on their computer systems.

  5. Threats to your ICT system. • With lots of important data stored on your ICT system, you need to make sure you are prepared for potential threats to the IT infrastructure. • First of all, viruses may attempt to attack your computer system, they can come in the form of: malware, botnets, trojansand phishing. • Malware: is a software that is intended to damage or disable computers or computer systems. • Botnets: is a network of private computers infected with harmful software that is controlled without the owner’s knowledge. For example, sending spam. • Trojans: is a non-self-replicating malware which appears to perform a certain function, but in reality it gains unauthorised access to the users computer. • Phishing: it is an attempt to gain information such as usernames and passwords by masquerading as a trustworthy entity.

  6. Weak points within an ict system. • Weak points within an ICT system can threatened by crime or malpractice. Crime is illegally accessing information for a purpose that is against the law. Malpractice is the access of information that is not intended to cause harm, for example somebody leaving their computer unlocked. • Spyware: attaches to an operating system and can track a user’s use of the internet. • Hacking: gains unauthorised access through telecommunication links and can damage or steal data. • Internal IT personnel: companies securities are usually made up of their employees. Dishonest employees can pose as a threat.

  7. Continued • Networks: data on a network are vulnerable to external threat and can be tapped to allow eavesdropping. • Data stored offline: for example a memory stick, they can easily be lost or stolen so they should be kept locked away. • Data stored on a computer: a users’ personal computer can be vulnerable if attached to a network and unauthorised users can access information. • Data entry: data can be entered into a system with criminal intentions.

  8. How to protect your infrastructure. • Hardware measures- make sure if you keep information on a USB or disk that you keep it safe and don’t lose it. Don’t leave USBs lying around unattended with important data on them. • Software measures- always keep it up to date and use anti-virus software and keep that up to date. • Procedures- keep your PC locked when unattended and make sure the password is not predictable. Keep back up copies of data in case it is ever lost.

  9. Case studies. • Below are two news stories on companies who have been hacked. • According to computerworld 90% of companies get hacked according to surveys. • Twitter resets 'hacked' passwords after being compromised. Source: http://www.computerworld.com/s/article/9217853/90_of_companies_say_they_ve_been_hacked_Survey Source: http://www.bbc.co.uk/news/technology-20256682

More Related