Using Security Polices & Controls to Overcome Business Challenges.docx - RUNNING HEAD Using Security Policies Controls to Overcome Business

Using Security Polices & Controls to Overcome Business Challenges.docx

This preview shows page 1 - 4 out of 5 pages.

RUNNING HEAD: Using Security Policies & Controls to Overcome Business Challenges Using Security Policies & Controls to Overcome Business Challenges Jessica Risch Friends University
Header: Using Security Policies & Controls to Overcome Business Challenges Abstract Implementing the proper security controls is critical for any organization to properly protect its information technology assets, as well as, the data that resides on the network. XYZ Credit Union/Bank holds sensitive financial data for customers at multiple branches and locations throughout the region. Due to the data that it holds, this institution wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees. With this said, this report will identify four possible information technology security controls for the bank, as well as, the rationale behind these suggestions. 2
Header: Using Security Policies & Controls to Overcome Business Challenges The advancement of technology is taking the world by storm by providing individuals and organizations with more effective means of communicating and conducting business. These methodologies not only allow for copious amounts of end users to connect to the Internet in almost every inch of the world but also allows for the ability to automate and streamline business functions. With this life changing technology, however, comes an exorbitant amount of security

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture