Where the company has to take any measures that the company can afford to take when it comes to protecting the customers’ data there are limitations

Where the company has to take any measures that the company can afford to take when it comes to protecting the customers’ data there are limitations

 Where the company has to take any measures that the company can afford to take when it comes to protecting the customers’ data there are limitations. Where I can understand limiting the employee’s ability to bring in any of their own devices to work there comes a point when you put so many restrictions on your employees that no one is going to want to work there. I haven’t worked in a job since I was in high school where I was allowed to have my personal phone or other devices within the property of the job. So when I hear of people complaining about their employers not allowing them to have cell phones on them I feel they need to suck it up. I’ve gone 14 years with out being allowed to have my own cell device on me and it wasn’t until March of this year that I moved to a position where I was given a work phone, so up until March I had no contact to the outside world for 12-16.5 hours of the day while at work. Trust me it sucks but it is more then doable. It is my opinion that if someone wants your data they will find a way to get it you just have to make sure that isn’t easily accessible and that they get tired of trying and move on to easier targets.

Feedback 2

Data breaches range from phishing attacks to more sophisticated methods like malware injections by hackers who actively exploit vulnerabilities. Organizations implement multi-layered approaches to , including access controls, software updates, encryption, and employee training. However, striking a balance between employee data utilization, customer protection, and integrity is crucial.

The user’s habits and behavior can contribute to data breaches (Kaspersky, 2023). Extreme measures like completely halting BYOD or banning cell phone usage may not be practical or necessary. Instead, organizations should focus on educating users about best practices, such as utilizing strong passwords, not sharing them, and securing devices with encryption software.

Certain organizations must comply with specific regulatory standards when handling data. For example, the Sarbanes–Oxley Act (SOX) imposes requirements on electronic record keeping, including record integrity, retention periods, and storage methods (Andress, 2019). Additionally, organizations should consider the principles of Information Security, including confidentiality, integrity, and availability (Kim & Solomon, 2021).

References: 

Andress, J. (2019). Foundations of information security: A straightforward introduction. No Starch Press, Incorporated.

How data breaches happen. . (2023, May 18). 

Kim, D., & Solomon, M. G. (2021). Fundamentals of information systems security. Jones & Bartlett Learning, LLC.

Answer preview to where the company has to take any measures that the company can afford to take when it comes to protecting the customers’ data there are limitations

Where the company has to take any measures that the company can afford to take when it comes to protecting the customers’ data there are limitations

APA

339 words

Get instant access to the full solution from yourhomeworksolutions by clicking the purchase button below








We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.