Malware

Submitted by: Submitted by

Views: 101

Words: 544

Pages: 3

Category: Science and Technology

Date Submitted: 01/24/2014 07:34 AM

Report This Essay

Due to the Malware attack that shutdown Gem Infosys' network for 2 full days, the company has decided to upgrade and secure its computer systems. Due to this awful occurance, the company has decided to formulate a policy to reduce network downtime if future incidents occur. In order to prevent or reduce down time, there are several steps that will be in place and effective immediately.

First, the employees and supervisors will go through training sessions involving the basics on security and a few points on learning computers and networks. In security, employees and supervisors will learn how to beef up their passwords and learn to not associate these passwords to themselves, ie: my favorite food or favorite football team. Passwords should not contain anything that has to do with anything involving their names, ie: King1. An example of a strong password which will be taught is h34$**()Hf@1. This may look a little funky but it is very important in order to prevent any unwanted usage. Employees and Supervisors will also learn to keep their office doors closed, computers and mobile devices locked when not in front of them, and never ever give out their passwords or any information to anyone. Some more insight on the class will include how to distinguish emails (good from bad). Never open emails from people they do not know, and how to disgard emails from friends or co-workers that don't make sense even if they know who sent it.

The IT team will be trained in monitoring traffic on the network. Possibly installing some software that can help aid in intrusion prevention and detection, also learning how to choose the best malware software, and to make sure any and all equipment is updated on a constant basis. Also IT will keep track of updating signatures. The IT team will also be the only ones to be able to install any and all software on Gem Infosys' computers and any associated devices. The IT team will be train with the latest security tools and upgrades which will...