There are several ways of protecting a company’s data.

A:

A records retention policy is part of the overall content management policy, and focuses on ensuring that all business records are retained for a period of time that will provide reasonable assurance of the availability of those records when needed. retention helps in driving the efficiency delivered by content management by setting periods and dates whereby data can be removed from the active business environment, generally through deletion .The retention policy at my workplace specifies the periods over which the different kinds of records are kept before deletion. Some records are retained temporarily while other are retained permanently. For example, accounts receivable and payable ledgers and schedules are stored for seven years, bank statements, deposit records, and electronic funds are stored for seven years, employee demographic records are stored for three years, and employment applications are stored for three years from record creation or personnel action. Records stored permanently include end-year financial statements, organizational charts, patents and related papers, chart of accounts, and audit reports.

—————.(150 words) + 1 reference APA format.

B:

Most of the companies exactly managed and stated their security management even though they are having one or two glaring weaknesses. Due to threatening actions employees are not able to avoid most of the actions through their well being. Social engineering is the biggest substantial sword in an attacker’s tool kit. It is also called as a public hacking. Social engineering is the data utility for illegal puncturing of an organization’s information system from the utilization of fraud and individual prompting to acquire authentication. Supportive individuals will be going around through the proper data innocently taken by the hackers .Present days most of the people are getting emails like assuring that once clicking on the given link they are going to get a huge amount of money, but those websites are malware. For hackers sending this type of mails cost nothing so they will send millions of people. Out of that few people are replied, then also it is also very sufficient money they will get. Few of the instances like q phone call from a new person and told that they are from the support service center and asking your credentials like profile name and password then they are able to change the details through any emergency fraud software application, later hacker able to theft all the amount from an account and information. The attackers finding good software persons from any type of social media platform, then call to that person and told that we are calling from so and so the company we are biding urgently and we would like to know which antivirus application is your using.

—————.(150 words) + 1 reference APA format.

C:

There are several ways of protecting a company’s data. The first is encryption, which involves hiding the content of data in such a way that the original information is recovered only through the use of a key referred to as decryption process . The primary objective of encryption is to secure or protect data from unauthorized access in terms of viewing or modifying the data. It can be implemented using some substitute technique, shifting technique, or mathematical operations. This helps in maintaining the confidentiality as well as integrity of data.Data can also be protected through cooperate data security policy. The policy outlines the acceptable use of data and information systems. Employees are informed about how they should interact with company data. This prevents incidents where the actions of employees compromise the security of data. For example, data protection policy will protect data from the risks posed by social engineering.Finally, the organization can protect its data through cloud storage. The use of a cloud provider ensures that the data will remain available even when information systems within the organization are damaged during a disaster . Data is automatically stored to another location, which implies that backups do not have to be manually managed or started.

—————.(150 words) + 1 reference APA format.

Image preview for  there are several ways of protecting a company’s data.

There are several ways of protecting a company’s data.

APA

513 words

There are several ways of protecting a company’s data. was last modified: by