Sign In
Not register? Register Now!
Essay Available:
You are here: HomeEssayIT & Computer Science
1 page/≈275 words
1 Source
IT & Computer Science
English (U.S.)
MS Word
Total cost:
$ 4.5

Network Security, Personal Data To Store, Potential Clients (Essay Sample)


Network Security

Your Name
Teacher’s Name
Class Name
16 November 2017
Network Security
Network security is a big concern for the companies whom have large amount of personal data to store for their potential clients. Here is a list of few suggestions which should be used by companies in order to prevent loss
List of activities that Companies should do:
* The first thing that companies should do is that they buy a security device such as Sonicwall, it protects companies data by removing all unwanted data and programs on pc used by all employers.
* A common method to do is protecting a computer by an antivirus program which will protect the computer from viruses and keep its updates on. (Cobb, chey)
* Web browsers are the most important target for phishing agents, companies must buy browser security agents. (The Cyber man)
* Do maintain a list of passwords which should consist of corporate passwords and personal ones separately.
* Maintaining a relationship with cyber security firm is also very beneficial as company can get updates about new security threats and policies.
* Keep programs in computers which are updated and regularly evaluate them by using bitlocker and Secunia.
* Always use cloud data system for sharing data.
List of activities that Companies should not do:
* Companies should not search for dangerous keywords online
* Don’t disable security protecting software in computer in order for high speed internet availability.
* In company computers, no one should be allowed to have p2p architecture programs in the computer just as bit torrent and uTorrent. (The Cyber man)
* Don’t take email casually, and open them with pure attention as they can contain malicious content which can store malware in computer.
* Always inform your employees that they never enable auto complete feature on web browser as it can remember passwords automatically.
* ...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Threats in OSI Model Research Any Type Of Security
    Description: When OSI model was introduced, there was no thinking of any type of security. Hence, there is no security in the OSI model and to be fair, there wasn't in the TCP/IP model either. Here are threats in each security layer of OSI Model....
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
  • The Role Of Stakeholders In Information System Development
    Description: Discuss Methodology Of Undertaking System Analysis Design In Business Organizations. It Looks At The Role Of Stakeholders In Information System Development...
    5 pages/≈1375 words| 2 Sources | APA | IT & Computer Science | Essay |
  • About Security: Internal and External Security Planning
    Description: Recent advancement in technology has made it difficult for small and large businesses to advance or even run smoothly without a network. ...
    8 pages/≈2200 words| 4 Sources | APA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!