100%(6)6 out of 6 people found this document helpful
This preview shows page 1 - 4 out of 5 pages.
RUNNING HEAD: Using Security Policies & Controls to Overcome Business ChallengesUsing Security Policies & Controls to Overcome Business ChallengesJessica RischFriends University
Header: Using Security Policies & Controls to Overcome Business ChallengesAbstractImplementing the proper security controls is critical for any organization to properly protect its information technology assets, as well as, the data that resides on the network. XYZ Credit Union/Bank holds sensitive financial data for customers at multiple branches and locations throughout the region. Due to the data that it holds, this institution wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees. With this said, this report will identify four possible information technology security controls for the bank, as well as, the rationale behind these suggestions.2
Header: Using Security Policies & Controls to Overcome Business ChallengesThe advancement of technology is taking the world by storm by providing individuals and organizations with more effective means of communicating and conducting business. These methodologies not only allow for copious amounts of end users to connect to the Internet in almost every inch of the world but also allows for the ability to automate and streamline businessfunctions. With this life changing technology, however, comes an exorbitant amount of security