Case Study 2

.docx

School

George Mason University *

*We aren’t endorsed by this school

Course

320

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

3

Uploaded by KidPuppyMaster1919

Report
Geraldine Arandid Professor Chun Huang MIS 320-001 10 March 2023 Case Study 2 1. Knowing how the firm responded, what would you have done differently? In this situation, the employee made the right move which immediately reported the theft to the police and the health care system’s IT department. However, the healthcare system’s IT department also should have self-destructed the laptop instead, so that the theft would no longer have access or to hack the computer. Also, the health care system’s IT department would have access to delete all the confidential files. In that way, Michaelson explained that employees should have a tablet or use their phone that is connected to their laptop to immediately lock which can slow down thieves because they must figure out the passcode to gain access. Also, if the missing device contained critical or confidential data, and it was all backed up elsewhere, the data could be erased. He also explained that 87% of firms rely on employees accessing work applications on their own mobile devices. 2. What are some steps you think the firm could have taken to prevent this incident? First, for the company which is the hospital, the company should make a rule or policy for employees to not bring any electronics for work devices outside of work. In that way, it won’t repeat the situation. Another company should have a secured app if electronic devices got stolen which can be able easily self-destruct or an app that can give you a notification that the laptop or any electronic devices got stolen. Second, for the employees, the employees should have known better than not to leave any devices that are for work unattentively. Also, the employees should have an app if their work device got stolen, they would get a notification,
and after that, they would report it immediately. Lastly, for employees, whenever they are logging in, employees should always log out of all the apps such as Microsoft Office, or any work sites so that it would prevent hacking it. According to the Department of Public Safety, the employees or the company should make a hard drive back up of data and keep them safe at their house or office and use the Universal Security Slot (USS) on their laptop to lock it to a fixed, unbreakable item with a cable. Therefore, daily data backups are essential, and are alert and aware of your surroundings. 3. Is your business susceptible? How are you going to reduce your risk? (You can use your family business, a company you have worked for, or GMU as your fictitious business) As a college student at George Mason University, my personal information has been secured. For example, when you log in to the Mason Portal, it always asks for two-factor authentication which is Duo Security, and sends a passcode through Mason Portal. George Mason University with the professional of ITs department, they are all prepared everything by layering the protection of personal information and Mason’s information. George Mason University also has Antivirus Software. If the students lost or got stolen their electronic devices, the theft would not hack or get into the victim’s laptop because the IT Mason department already has antivirus protection. Also, Mason has the ability to secure highly sensitive data in order to prevent hackers or thefts to steal personal information and Mason’s confidential information, and it’s called Highly Sensitive Data Authorization or HSD. The faculty staff and students will store all the data on their laptops or computers. In order to authorize to store HSD on their laptop or computer, faculty staff, and students must have a protection program to keep their stored data safe.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help