Recommendation Since the threats to information will always exist and hackers will keep on doing these whether there are legal actions that can be taken against them or not, people should be well equipped with information security threat skills. There is need to keep updating any new methods that are being devised to counter all threats ( Siponen et al. 2014). Also, there should be thorough train8ing on this topic to make sure everybody is well equipped not with theory but skills in this topic. Without security or adequate information security, there will be always increased cases of accessed or hacked information systems where hackers may end up mining an organization critical and confidential details ( Peltier, 2016).
INFORMATION SECURITY 13 Thorough research should be done to come up with new methods or techniques of detecting any threat or malicious people trying to access information illegally. Also, companies should employ trustworthy employees who will be in charge of information systems. This way there will be reduced threats. All higher learning institutions should implement this topic and be considered as essential to everybody and a must study with a later examination to assess the learner’s level of understanding and how much they can do. There should be practical and demonstration to test this to ensure they are adequately equipped. Conclusion Since the information security has been widely discussed and may not be well understood, then the topic needs a keen training. The threats to be minimized then there is need to have clear information and set detectives to counter this. Every threat needs its own mechanism to and an alternative in case of failure ( Siponen et al. 2014). All systems that are much vulnerable needs to be updated in addition to the trusted employees in the firms.
INFORMATION SECURITY 14 References Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice . Syngress. D'Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding employee responses to stressful information security requirements: A coping perspective. Journal of Management Information Systems , 31 (2), 285-318. Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management . Auerbach Publications. Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & management , 51 (2), 217-224. Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in big data: privacy and data mining. IEEE Access , 2 , 1149-1176.