Preview

Employee Security Policy Paper

Good Essays
Open Document
Open Document
880 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Employee Security Policy Paper
QWD’s security policy does not address the topic of employee’s using company equipment such as the IPhone’s, Windows cell phones, and laptops for personal use. This should be addressed in an Acceptable Use Policy. By the company not making it a policy that all company equipment is for company use only, it leaves the company vulnerable for open attacks. It is not unfeasible to think that employees do use company provided equipment for personal use. Employees use the devices to send and receive personal emails through non-related company sites such as Yahoo, Hotmail, and Gmail. They use the company devices to surf the web, shop for items, play games, download applications, get on social networks such as MySpace, Facebook and Twitter, watch videos, …show more content…
The threat that can arise are if an employee downloads a virus, malware, or Trojan to their mobile phone, laptop, and even desktop. This is especially so for the remote devices because when these are connected to the Exchange server, it can infect the corporate network. If an employee is using their desktop to surf the Internet for personal usage and they open an email sent by a friend that has a virus attached, it can infect the network. Another example is if an employee registers for something personal online, such as a sweepstakes, this …show more content…
If anything the employee has downloaded and allowed to infect the company network, it is safe to say that number goes up. If infections are passed onto the network, it could halt business processes. In order to fix the problem, it would cause the company time and money. The company also has to try and assess how much and what type of damage was caused by the attack. It could also keep employees from accessing necessary applications, emails, and working on time sensitive projects.
If the employee has downloaded a virus through their personal email that is meant to search for email addresses and send out viruses, it could hurt the company. In the article by George Fowler, it states that if attackers are able to obtain customer’s information, they can send spear-phishing emails. (Fowler, 2011) Then the customer would open it because they believe it is coming from QWD. This would compromise the trust of the customer with the company and could affect

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In the workstation domain, each workstation, whether desktop or laptop, must have antivirus and malware protection installed on them. Laptops are vulnerable to loss and theft, so laptops should have an encrypted hard drive so that if stolen, the data contained on them is not compromised.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Thank you for the opportunity to provide the essential details of employment law compliance for Bollman Hotels ' global expansion into India. Currently, Bollman Hotels, an organization with 25,000 employees, operates in Minneapolis, Minnesota. The transition to a global presence will begin by building upon the past success and experiences of the existing HR department (University of Phoenix, 2014). Unique challenges businesses encounter in India include inflexible labor laws, a convoluted system of central,…

    • 1416 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This can be through a desktop, company laptops, tablets, or any device that connects to the network. Employees should always remember to log off their workstations to avoid unauthorized use as well as not giving out their passwords to co-workers. A good idea is to enable the screen lockout when the desktop is idle. Also block or limit user rights to download, install software, and their access to certain files on the web. This can decrease the threat of viruses, malware, and any harmful files being seen, downloaded, and installed into the system through the workstation. It is very easy for threats to spread throughout the network so it is very important to have a top shelf Anti-virus in place and enable it to scan any CD, DVD, or USB drives inserted into the…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    User domain is essentially the people who access the information system. User domains tend to receive risk due to the user’s carelessness due to lack of awareness, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies fresh in the employee’s mind. Another common threat is caused by employee misuse of the system. Employees might insert USB drives, or download photos music and videos. These items might contain virus’s which in turn damages the system. The USB ports should be disabled and content filtering and antivirus scanning should be enabled.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    information security intrusion to the entire organization, and not just that particular computer, for the…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Per your request, I was delegated the duty of developing the Employment Law Compliance Plan for Bradley Stonefield and his limousine company. Based on the meeting notes, Mr. Stonefield wants to operate a limousine company in Austin, Texas and to have at least 25 employees working for him within the first year. To ensure the success of Mr. Stonefield’s business, I have developed an employment law compliance plan that he should follow.…

    • 1409 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In a working environment that has lost of infectious substances, there are lots of procedures to ensure the risk of these spreading is reduced dramatically, if all policies and procedures are followed to the highest of standards then infections spreading should not occur and all staff will be able to work in a clean and safe environment…

    • 1046 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Infections in the workplace can occur anywhere in which harmful micro-organisms are present. These can include, but are not limited to, fungi, bacteria, internal parasites and viruses.…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Good Essays

    If you were to go to your work place with symptoms of a virus then it's quite likely that you've got an infection. By even approaching other individuals within your workplace you are putting them at risk of infection. You are passing the infection on. However if you haven't got any symptoms of an infection and you feel as fit as a fiddle all well and good, unless your cleanliness isn't up to scratch...This can cause bacteria which can then cause a virus. You should try to keep clean and healthy within a work place to keep a healthy environment.…

    • 575 Words
    • 3 Pages
    Good Essays

Related Topics