preview

An Interview With Upper Management

Better Essays

In regards to the processes that management goes through during implementation, Al-Awadi & Renaud (2007) conducted an interview with upper management and IT experts on their insights and experiences in order to have a successful information security implementation. The experts primarily focused on five things that lead to a successful process: awareness and training, management support, budget, information security policy enforcement and adaptation, and the organization’s mission.
To start, all organizations that participated in the study agreed that the simple step of intensifying IT awareness and providing training for employees would help information security. However, this is not the typical one-time training session, it was argued that organizations should continuously educate and conduct training programs. The systems are constantly changing and intruders are constantly finding ways around. It is important to have frequent training and emphasize the importance to hone users skills to prevent attacks and understand procedures if an attack were to occur. Nevertheless, there is still a downfall. It is also possible for organization’s own employee to carry out ‘insider threat damages,’ which has been found to be the biggest threat to information security. Evidently, it is not possible to protect information even with the best software, but with more educated users, the smaller the chances of being hacked externally. Furthermore, if employees fail to properly handle

Get Access