The Security Update: The Richman Investments

Read Complete Research Material



The Security Project 2

The Security Project 2

Introduction

The Richman Investments encompasses almost 5000 employees and the technological assets within the company include mobile computers, wireless devices and desktops. Company encompasses many computers which are running Windows Vista, Mac OS X, Windows XP and Windows 7. Majority of the managers of the company have BlackBerry devices whereas all of other employees of the company are provided with their cell phones. Each office has a setup of Windows Active Directory. Print servers and seven file are placed in the Phoenix office. Two proxy servers are also present in Phoenix office which helps in providing internet access control and Web cache services for the company. Many applications of the company are hosted from the Phoenix office and all of these applications are Web-based. There is an internet connection provided by the Phoenix office to all of the remote offices. Internet access has been provided to all of the employees within the company and organization does not encompass any policy related to the use of removable media. Recently, many branch offices experienced malware attacks in their systems. Richman has hosted an extranet and intranet within the organization. Because of the integration of new technology into the organization, there is a need to update security policies of the company in order to provide safe and secure environment and systems to the employees.

Discussion

Policies and Procedures

For preventing the information assets of the company, there is a need of security systems for thwarting new risks which occur due to the internet connectivity. The risks that can threaten the security of the organization include false information or misleading, internet services and improper use of resources. All of the employees of the company will be required to use the internet for business purpose only (Burgado, 2010). Internet access will be provided to some employees for the business purpose only. Job responsibilities of the employees will be considered for approving and providing access to the internet in the organization. Thus, internet access will be approved in order to support business activities. If an employee uses company's internet for personal use without the approval of IT department and manager then he or she will be caused for penalizing action including termination. Employees of the company will not be allowed to access company's information such as illegal access to personnel file information, unauthorized access to the information of customer's account and accessing any information which is not required for execution of job responsibilities (Burgado, 2010).

Internet usage within the Richman Investments is encouraged and permitted for supporting several different operations of their business. All of the employees of the company will be required to strictly follow all of the security procedures and policies which have been approved by the company's IT department and managers. All of the employees of Richman Investments will be complying with all of the current legislations related to IT security (Kajava & Remes, 2000). Furthermore, the employees of the company will user the internet in secured and protected ...