The Social System: Users, Managers, and IT Professionals Essay

The Social System: Users, Managers, and IT Professionals

Network security has become one of the major issues against businesses and other official transactions. As the technology is flourishing the techniques for phishing, hacking, and masquerading are increasing with the same pace. These kinds of threatening activities with the business network can destroy the operations, effectiveness, and the trust of customers. The reason is kept behind the fact that still there are people who do not buy any virus protection. As a matter of fact not even a single end user will take any measure for an unforeseen danger. The antivirus whose protections are already available for free can handle only the very common problems and for updating the signature of antivirus all the companies charge some cost. If any reputed antivirus companies take an initiative to provide their best virus protection free of cost to the home users, it is good for the organizations themselves not only ethically and in terms of getting enough profits too as very soon this deed will show its effects (Vamosi, 2004).

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Besides, the unavailability of antivirus software for free, there are other issues as well which keep the threat of viruses intact. All these issues are directly or indirectly related to the network security which includes huge losses such as Knowledge Theft, Worms, Virus, Malware, Spyware, Other Intrusions, Lack of User and Vendor Trust, Unavailability of Business, Loopholes caught and used by the Hackers in new technology, and Security Legislation (Cisco Systems Inc., 2005).

It has been observed that people’s perceptions always differ, be it anything. Similarly these virus threats are also taken differently by the people belonging to different schools of thought. For example observation of IT professionals and end users about the spam differ highly. Spam is no problem for end users while IT people see them as a huge risk. The opinions differ because the end users might not be having much problem in their operations, while IT people who are controlling the actual flow of those processes have a clear view of coming hurricane of spams and they then worry about handling them which would take most of their time. But both of them declare these as long-term catastrophe which would always try to infect them soon enough (Gaudin, 2004).

There should be part of every individual in maintaining the network security. End users should always take care of their systems by always having an antivirus and keeping that up-to-date, by opening only those emails whose sender is verified properly, by installing security patches with every new installation of any software, by making backups and testing them thoroughly, and by being only on a single dedicated network. This would ensure them safe computing and no liabilities (About.com : Business Strategy, 2009).

To execute the business, IT professionals and top management executives should go hand in hand which would ensure the safe and effective business. The part of top management should be played well enough when they would assign experienced staff for security of networks, when they would realize the fact that business problems are entailed by information security, when they would effectively deal with the operational features of security such as insurance, manpower, budget keeping for this domain of seeing an unforeseen thing which may happen or may be not, when they would realize the worth of their organization and information, when they would learn to fix their problem in the longer run, and when they will stop ignoring the problems (About.com : Business Strategy, 2009).

The IT professionals must learn to play their part too besides grieving on other’s mistakes. They should harden the system hardware and software first before incorporating internet, should avoid publicizing the default id and password while testing systems, should update on the discovery of loopholes left in the system, should avoid using unauthentic and unencrypted protocols fro controlling system and network devices, should keeping the passwords secret while talking on the public conversations or telephone, should be making and sustaining the test backups, should avoid running superfluous utilities, should execute firewalls within proper guidelines preventing from hazardous outgoing and incoming flow of data, and last but not the least they should incorporate the best available virus security (About.com : Business Strategy, 2009).

The vision is that if the antivirus software producers make the same signature file for their both type of consumers, they will please their corporate clients by updating their antivirus for the latest viruses. This idea envisions corporate clients paying for the annual updates but the home users getting it for free. This vision is to keep the computer world free of threatening activities and at the same time, the whole IT industry would have a mentor to look at who has made this free environment possible (Vamosi, 2004).

The strategy suggests that the anti spam products should be free of cost for the desktop computer and with that there is a guarantee to the companies that they will not lose their profits at all. The reason behind this guarantee is that the safer the internet environment the more users will be adding in. Today people are afraid of doing businesses and their banking transactions on this medium. As soon as the vendors and customers will regain their confidence in internet environment, the future of e-commerce will also start to shine. All this will happen if any of the anti-virus company takes such a bold decision (Vamosi, 2004).

References

About.com : Business Strategy. (2009). Staffing and Security. Retrieved March 9, 2009, from About.com : Business Strategy: http://bizsecurity.about.com/od/staffingandsecurity/Staffing_and_Security.htm

Cisco Systems Inc. (2005). Top Five Security Issues for Small and Medium-Sized Businesses. Retrieved March 9, 2009, from Cisco Systems – Smart Business Communications: http://www.developers.net/ciscoshowcase/view/1162

Gaudin, S. (2004, June 18). IT and End Users differ on Spam Severity. Retrieved March 9, 2009, from Security: http://www.enterpriseitplanet.com/security/news/article.php/3370591

Vamosi, R. (2004, March 2). Antivirus software must be free. Here’s why. Retrieved March 9, 2009, from ZDNet Australia: http://www.zdnet.com.au/reviews/software/security/soa/Antivirus-software-must-be-free-Here-s-why-/0,139023452,139116369,00.htm

;