1 / 16

The Importance of Information Security

What is information security? See why your organization needs a robust information security plan.

Download Presentation

The Importance of Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information securitywww.penneycomputer.com Protecting your internal and external assets

  2. - No matter how small or large your company is, it is important that you have a plan to secure your information assets.

  3. WHAT IS INFORMATION SECURITY • - Information security, also referred to as InfoSec for short, is the practice of protecting information from unauthorized access. This also includes, preventing the unauthorized disclosure, use, modification, disruption, recording, and inspection of information.

  4. DON’T WAIT… SECURE NOW • - Data held on computer systems are usually critical to the operations and overall business of an organization. However, it is common for some businesses to neglect security until their data assets become threatened or otherwise stolen.

  5. IMPORTANCE OF infosec • - In business, it is not uncommon for organizations to collect customer data. Sensitive company data or information assets are also stored internally. This is largely why it is important that organizations pay attention to information security.

  6. - The purpose of information security is to preserve confidentiality, integrity, and availability. Let’s take a look at them quickly.

  7. confidentiality • - This ensures that only those with the right to view your information have access to them. This will help protect your company from internal and external threats.

  8. Integrity • - This ensures that your data is reliable, accurate, and processed correctly. Accurate and reliable data will help your employees meet and/or exceed company expectations.

  9. availability • - This ensures that data can be accessed whenever it is needed or when it is requested. Thus, improving overall efficiency.

  10. Types of information security threats • - There are several information security threats and as IT systems become more advanced, it is crucial that we can clearly identify these threats so that we may stay safe.

  11. In a 2013 TEDx presentation, AnishBhimani, Managing Director and Chief Information Risk Officer of JP Morgan Chase, grouped potential security threats into two categories. These were disruption and fraud.

  12. disruption • – This group consists of “hacktivists” and people who may hate big businesses or individual companies. These people can cost an organization a lot of dollars. Some examples are service attacks, website defacements, email hacking and other disruptions.

  13. fraud • - This group of people are more focused on stealing money and intellectual property. This includes identity theft, banking information theft, and other information that may lead to cash.

  14. One recent event in regards to information theft is the email hacking of Colin Powell, former top diplomat to USA’s former president George W. Bush. According to the NY Times, Colin’s email was breached and leaked online. You may be able to imagine the potential damages that have occurred.

  15. Owning a culture of security awareness • - Information security has to be part of the day to day thinking of your employees. It has to be thought of and seen as an important aspect of your organization’s success. Although, IT generally handles the technical aspects of security, your employees should also be made aware of the many risks that are out there.

  16. To address potential information security risks within your organization, reach out to us at: • Penney Computer Consulting • info@penneycomputer.com • http://www.penneycomputer.com • Thank you for your time.

More Related