Professional Documents
Culture Documents
Analyze how suggested procedures that ensure an organization works in a legal and ethical
way would impact on an organization and its stakeholders.
Berimbolo Security can apply the following policies and procedures to avoid security threats or
spam;
The guidelines for Internet use which will show how malware-held websites can be
avoided and to avert security violations during file download.
Safety and password protocols that will describe how credentials and authentication
keys can be protected.
Companies will have a set of guidelines as to what employees on their own devices are
and are not authorized to do while at work and how their devices can be connected to the
systems of the company.
Personnel responsibility can involve securing office cabinets and drawers, closing or
shutting down unattended devices, carrying Identity card, and not disclosing any details
or other basic safety measures intended to prevent from social engineering threats.
Employees will have to be aware of the disciplinary repercussions of intentionally
violating the rules of any IT usage policy.
Guidance on how to carefully handle unknown email channels should be given by email
usage policies, including not opening attachment or following hyperlinks.
The need to achieve a balance between safety and accessibility is one of the problems with safety
measures and baselines. The rules applicable for IT protection should not prevent the company
from effectively performing its regular operations.
Every corporation must have legal standards in order to safeguard both the firm and its clients by
enforcing various types of laws. These rules must be observed by the corporation, and they also
aid in the prosecution of any intruder who seeks to harm the business. Legal regulations will also
assist a company in avoiding security breaches. Some of the biggest and most detrimental
consequences are;
Ruined Reputation: Individuals purchasing their goods or facilities online must trust that the
economic and private data they provide to the company is protected. If this gets know to the
community that a company has experienced a security breach, since they are no longer trusted, it
may hurt its reputation and lose customers.
Vandalism: This is the establishing of dishonest evidence and is a method that foremost hackers
like to apply.
Theft: It is possible to access the bank account details if hackers succeed to break into the site or
system. An example will be the security breach that happened over the summer at Citibank.
Revenue Lost: If a hacker reaches a person’s site and crashes it or triggers an extended downtime
span, activities will stop and the person will lose profits. When someone begin to look unreliable
and potentially lose reputation, the longer his website remains down, the more he can lose.
Damaged intellectual property: If a hacker breaks in and snips thoughts, tactics, or designs, a
person might miss out on being able to fully launch innovative products or projects, that could
prevent the commercial from growing.
It is the legal duty of organizations that store personal information on their computer systems to
keep that information secure. The firm will face lawsuit under the Data Protection Act and get a
substantial fine if private data is negotiated during a cyber-attack and this can be seen that the
organization has been lax in keeping particular data secure.