Case Study 2
.docx
keyboard_arrow_up
School
George Mason University *
*We aren’t endorsed by this school
Course
320
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by KidPuppyMaster1919
Geraldine Arandid
Professor Chun Huang
MIS 320-001
10 March 2023
Case Study 2
1.
Knowing how the firm responded, what would you have done differently?
In this situation, the employee made the right move which immediately reported
the theft to the police and the health care system’s IT department. However, the
healthcare system’s IT department also should have self-destructed the laptop
instead, so that the theft would no longer have access or to hack the computer.
Also, the health care system’s IT department would have access to delete all the
confidential files. In that way, Michaelson explained that employees should have
a tablet or use their phone that is connected to their laptop to immediately lock
which can slow down thieves because they must figure out the passcode to gain
access. Also, if the missing device contained critical or confidential data, and it
was all backed up elsewhere, the data could be erased. He also explained that 87%
of firms rely on employees accessing work applications on their own mobile
devices.
2.
What are some steps you think the firm could have taken to prevent this incident?
First, for the company which is the hospital, the company should make a rule or
policy for employees to not bring any electronics for work devices outside of
work. In that way, it won’t repeat the situation. Another company should have a
secured app if electronic devices got stolen which can be able easily self-destruct
or an app that can give you a notification that the laptop or any electronic devices
got stolen. Second, for the employees, the employees should have known better
than not to leave any devices that are for work unattentively. Also, the employees
should have an app if their work device got stolen, they would get a notification,
and after that, they would report it immediately. Lastly, for employees, whenever
they are logging in, employees should always log out of all the apps such as
Microsoft Office, or any work sites so that it would prevent hacking it. According
to the Department of Public Safety, the employees or the company should make a
hard drive back up of data and keep them safe at their house or office and use the
Universal Security Slot (USS) on their laptop to lock it to a fixed, unbreakable
item with a cable. Therefore, daily data backups are essential, and are alert and
aware of your surroundings.
3.
Is your business susceptible? How are you going to reduce your risk? (You can use your
family business, a company you have worked for, or GMU as your fictitious business)
As a college student at George Mason University, my personal information has
been secured. For example, when you log in to the Mason Portal, it always asks
for two-factor authentication which is Duo Security, and sends a passcode through
Mason Portal. George Mason University with the professional of ITs department,
they are all prepared everything by layering the protection of personal information
and Mason’s information. George Mason University also has Antivirus Software.
If the students lost or got stolen their electronic devices, the theft would not hack
or get into the victim’s laptop because the IT Mason department already has
antivirus protection. Also, Mason has the ability to secure highly sensitive data in
order to prevent hackers or thefts to steal personal information and Mason’s
confidential information, and it’s called Highly Sensitive Data Authorization or
HSD. The faculty staff and students will store all the data on their laptops or
computers. In order to authorize to store HSD on their laptop or computer, faculty
staff, and students must have a protection program to keep their stored data safe.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help