Updating security procedures and scheduling security audits
Introduction Unit15 - Organisational System security Security policies Guideline updating of security procedures and scheduling of security audits Updating current measures of security e.g.anti-virus and firewall to keep protection at its highest.Making sure buildings and systems aren't being accessed by unauthorised people e.g. social networking, games, restricting downloads etc. surveillance and monitoring policies Installing security devices such as CCTV, to protect the building and data e.g.with the use of id cards and usernames with passwords. by making sure employees don't damage equipment etc.A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices.
Doing this may cost the organisation money but I believe that the cost will be worth it because it will safe guard their data from being access by an unauthorised personal.There are many there are many guidelines and policies that have been put in place to manage organisation system security, they include being: This is a plan which is put in place if something goes wrong in an organisation for example if there is a fire and it has destroyed everything in an organisation then they will need have a back plan of what they need to do in order to make everything fine again.If this is not in place then the organisation might have to close down or start again, this will make them lose a lot of money and also have a bad reputation from their clients because they lost their vital information and data.Also reviewing current measures of security in order to make sure the current system is reliable and finding ways to improve it. email usage Establishing the rules for using the email system within the organisation e.g. internet usage policy Internet should be used for only business related tasks. risk management; Carrying out risk assessments and providing employees with updated health and safety guidelines. Middle It is used in combination with activity logs to make it easier to see whose done what.business related enquiries only, not for personal use, e.g. ensuring compliance including disciplinary procedures We should make sure all employees are aware of the consequences of not sticking to the company policies. informing them of disciplinary steps if a serious breach of company policy is committed e.g.