Concept explainers
Case summary:
Person X is hired to lead a technical support team for a start-up business. The services provided by the company area data analysis, targeted market, and business consulting to auto dealers. At present, the company serves seven cities and they are planned to expand into 10 cities. It has flexible working hours and they encourage employees to work from home at least one day per week.
There has not been much of the technical support team at the company. Hence, they would contact an informal network of experts for hardware and software issues. An informal network of experts includes family, co-workers, and friends.
To determine: Whether there are additional data risks with employees working from home.
Want to see the full answer?
Check out a sample textbook solutionChapter 14 Solutions
Business Essentials (12th Edition) (What's New in Intro to Business)
- What security risks would a company need to consider when utilizing smartphone apps for work?arrow_forwardIn order to effectively manage risks associated with information systems, it is necessary to first identify and then assess potential threats.arrow_forwardData needs to be secured in three states: at rest, in use, and in motion. Select one state of data and describe its security challenges. What are some of the best practices securing data in that state?arrow_forward
- Is it moral to encrypt emails, ask IT professionals?arrow_forwardIs the security of email a moral or ethical quandary for people in charge of managing networks?arrow_forwardWhat are some best practices for managing the volume of information that a business encounters while maintaining privacy for employees, customers, and protecting of company data?arrow_forward
- What difficulties may arise as a result of the company's using a wide range of distinct types of information systems?What are some possible solutions to these problems?arrow_forwardInsecure usage of the many applications through mobile devices may allow cyber criminals to access sensitive information such as mail account and contacts information of your mobile devices. Many agencies have cautioned against the cyber vulnerability of the many popular games and applications and few others, used by tens of thousands of people who are confined to home due to the COVID-19 pandemic. Using your own experience the various cyber threats in using these vulnerable apps can be? and what security measures we can adopt to combat them .arrow_forwardList and describe internal (online) information security risks and mitigation tactics and how they will affect decision-making strategies.arrow_forward
- Analyze the legal and ethical implications of data privacy and security, and discuss the responsibilities of businesses to protect the personal information of their customers and employees.arrow_forwardIdentify several personal characteristics needed to be successful in an information system career. Do you feel that you possess any of these characteristics?arrow_forwardWhat are the advantages and disadvantages in your opinion, of mass sending unsolicited email to a large number of people? Give an example from a real-world situation to support your response.arrow_forward