You are on page 1of 10

Cyber security

Ashley Furniture Cyber security


opportunities areas for management
 It is crucial for any organization to protect their
security systems because cyber threats are rapidly
evolving.
 Ashley Furniture Industries can capitalize on:
 Expert consultation-Certain tweaks and hacks can
be conducted to bolster security in Ashley Furniture
Industries, but it is only effective if an expert is
looking the company at a holistic view
opportunities areas for management Cont.
 Add a web application firewall and real-time backups
 Have a two-step verification process to add another
layer of protection of data
opportunities areas for management Cont.
 Encrypting everything- The company should encrypt
data on rest and in transit.
 Management education on the latest security
practices.
 Safely store your data in the cloud with strict
permission levels to prevent easy access
Opportunities for employees
 Start with passwords such that thy can’t be guessed
easily
 They should cease from passwords or variations that
they use for their accounts such as having their names,
pets or any other that can be guessed from their social
media accounts.
Opportunities for employees Cont.
 Contacting the IT department in case of suspicion
 Educate themselves about phishing
Opportunities for employees Cont.
 Always watch out for threats and warnings.
 Validate senders to prevent phishing
Management support to IT Department
 The IT department is concerned with protecting the
security systems of Ashley Furniture Inc.
 The management can support the IT department by:
 Outsourcing support- In some instances, the IT
department will require some assistance from the
outside, and the management should always be willing
to assist
Management support to IT Department
Cont.
 Infrastructural support- The Ashley Furniture Inc.
management should always be willing to acquire new
technologies which are up to date.
 Quick response to information provided by the IT
department
References
 Amoroso, E. G. (2007). Cybersecurity. Norwood Mass:
Books24x7.com.
 Samuels, D., & Rohsenow, T. (2015). Cybersecurity.
New York: Archer Press.
 Tipton, H. F., & Nozaki, M. K. (2014). Information
security management handbook: Volume 7.

You might also like