StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Making a Security Strategy for Securing Client Details of BioMed Company - Case Study Example

Cite this document
Summary
"Making a Security Strategy for Securing Client Details of BioMed Company" paper discusses the information of BioMed Company that needs to be secure to retain their client details for the upcoming development of a new product. The company requires an intelligence security manager to secure information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful

Extract of sample "Making a Security Strategy for Securing Client Details of BioMed Company"

Information classification Name of student Name of Professor Course Details Institution Affiliation Date of Submission Table of contents Contents Table of contents 2 1.0 Introduction 4 2.0 GSM Technology 5 3.0 Desired by competitors 6 4.0 Important to keep confidential 7 5.0 Legal and statutory requirements 11 6.0 Hybrid calling 13 7.0 Conclusion 14 8.0 References 15 Executive Summary This essay discuses about information of BioMed Company that needs to be secure to retain their client details for upcoming development of a new product. The company requires an intelligence security manager to secure information from hackers. Business information of BioMed Company contains important client details that require protection. However, BioMed Company states that, their competitors can easily intercept their information on the network, thereby attracting loses of clients and business contracts. The company also needs software to keep their information private and confidential. The BioMed Company uses VPN software, which has helped them secure their emails and text over the last five years. VPN enables the company to connect with their client at their places, such as homes in a secure manner through a remote corporate server using internet. The protection the company requires will allow them to securely communicate with their client when their network is protected. According to security manager, the company should use private data that will protect their information. The security manager is concerned about security effectiveness and how private data works with a smart phone. This private security will keep the information of the company as well as the client’s according to their wants. It will provide communication from the company to the client and from the client to the company without interception. However, if the company wants to deliver important information, private data will pass through an encrypted network of the GSM, a sim technology that is nationally used. As a security manager, hybrid secure calling provides a combined encryption system that is highly secure for incoming and outgoing calls as well as private data. In summary, the hybrid system will secure all information on Smartphone and across any wireless network. Information Classification 1.0 Introduction In this present age, security has become the most important issue in companies as competition pushes development forward. It generally happens when other competitors want to identify information from developed companies. The world has grown into a technologically paced environment, and companies are using technology communication to keep their information secure. Companies have been using technology communication to retain their information exchanged with their clients. The current case study talks about technology communication that BioMed Devises Company has been developing over the last five years. The technology communication under study is the GSM mobile. GSM mobile is a card that makes phone calls and transfers information to a network. The BioMed Devises Company uses GSM to communicate with the stakeholders, throughout the world. The company CEO is using the VPN software to secure company information on the network. BioMed Company is concerned that their information can be hacked by their competitors. The company requires an intelligence security manager to secure their information against hackers.The present case study gives proper information on how to use the private data that will provide best services to the company. While using VPN software to secure emails on the network, it also is easy to secure GSM mobile use to secure interceptors who may retrieve company information through network. The CEO Manager of BioMed Devises Company has used VPN data securely to protect their information against external interception (TechNet 2003). Although, BioMed company devices has been using VPN to secure their information from other competitive (International journal of distributed and parallel system 2012). The CEO is concerned about the lack of security concerning incoming calls, and outgoing calls. The intelligence security manager has informed the company that hackers may intercept their calls during communication with their clients. In order to secure information on network, the BioMed company devices has to label the data as private (Guidelines for Data Classification n.d.). Classifying the information as both secure and private data helps in evaluating the security levels for the company. The evaluation helps the company in making a security strategy that best fits the scenario. 2.0 GSM Technology The company needs to discuss how it can secure the information though communication technology. BioMed company bases their devices on security intelligence in order build professional skills. The company has formalized its concerns about the issue of security at the company (Ramani,Valarmathy,Selvaraju&Niranjan, 2012). Many technologies advanced design companies use mobile phones to identify information through technology. This happens with technologies using GSM (Ramani et al., 2012). BioMed devises CEO Rachael, has been using GSM technology smart phones to communicate with clients over the last five years. Although VPN software has helped the company secure information over its network, it has played an effective role in securing information passing through the network. VPN can only secure outgoing and incoming emails, meaning all raw data are secure while the emails are secure,BioMed Devises Company needs to provide protection to the company’s information that is discussed via phone calls. According toRamani et al. (2012) Information that competitor’s desire should be secured, if it is to be safe from unauthorized competitors, or any other individual. Security as an essential to business Since BioMed Company wants to introduce a new product to its clients, the company needs to secure all sources through which the information may leak (Montgomery, 2012). For a new product that the company wants to introduce into the market place, even junior employees should not get wind of the information and all employees should be bound by ethical codes of the organization. Then the company should make sure that they keep any raw data indoors and safe (Montgomery, 2012). The facts remain that GSM technology system can be used for communicating while in a private state. It us a business essential that companies should keep the law on business. The company should make their technology communication easy connection to their client and always ensure that they are protected through methods such as encryption. BoiMed Company is able to secure their information from interception using several data protection methods, given the data are classified as secure (Guffey& Loewy 2012). Some companies provide their information to the group such as government bodies, banks, insurance companies, and medical professionals who contact the companies to employ their services. This long chain means that the organization is able to lose protection to their information. BioMed Company may incur losses if their competitors are able to intercept such information. The competitors could use this unpatented information, for development, before marketing the idea off as their own. 3.0 Desired by competitors To secure intercept information, the company should know what their competitors require. This will determine the security factors that the company needs to consider when seeking to secure information competitors require from the BioMed company (Drum, 2014). It is also easy for competitors to intercept information from the employees, who are using GSM mobile within the company network (Drum, 2014). However, the BioMed Company CEO, Rachael should rely on involvement with employees. The company has to investigate what its competitors are willing to look into from the company as well as their targets. The company must identify the sources through which their competitors could get through their information (Drum, 2014). In addition, the security manager should be able to identify the desire of competitors. Hence, the manager requires a lot of intelligence and high protection on the company information. Before BioMed Devices Company launches their new product (Lennerd, 2014), they have to go through all the security details to ensure that the company is moving towards success. The organization has to listen to the security manager, and note how to balance their keys and target. The BioMed Company should not just focus on what their competitors demand, but should keep their security details cemented. The company should be sure to use the target and the information their competitors require. The BioMed company should look on how their competitors them. Additionally the CEO herself should now begin to protect or secure their information (Guffey& Loewy, 2012). After significant developments for five years, competitors are looking up for the company information through technology systems. The BioMed Company should use private secure data, to protect their information from competition through technological innovations. The secure data could easily secure company information that is being connected on smart phone. However, it is important to secure the company information from the competitors. 4.0 Important to keep confidential Since mobile phone and technology are now interconnected than before into a single network, it is effective to institute confidential process that may enable the company advance in network security. The important information has been passing through the technology using GSM, a sim technology that is nationally used. This happens to keep information from the company important and confidential (Magalhaes, 2007). By gathering client information and keeping it confidential the company will secure information passed between the client and the company. Some other company information needs to be secure, because of its importance to clients. However, some other company information is a little effective (Magalhaes, 2007). This information does not require any further security protection, because of its general factors that are similar with other companies. While this information needs to be private and confidential, using smart phone is the best way to secure the company information. Through it, company information could be secured from the public to keep it private and confidentially (Magalhaes, 2007). Recording information cannot make it private for the company stakeholders. However, to secure the organization’s information, GSM technology only works with secure data if it is encrypted. When acompany delivers information to their client through GSM mobile, secured data is able to keep company information confidential (Kola &Akinyele, 2010). The company should keep information private using mobile phones, since they go through company security before reaching the recipient. In some cases, clients may need their information to be safer, and the company may need to keep information of their client safe (Kola &Akinyele 2010). However, in some reasons the company may look for alternative to secure their information from their competitors, as the CEO of BioMed Devices Company is required to. Hence, confidentially of information could be considered for the safety of securing. BioMed Devices Company should make their information private and confidential. This could enable the company to use a private data, in order to secure their information from competitors. Classifying protected the information of BioMed as confidential data typically presents data classified as restricted, within the data classification scheme. Business information of BioMed company often contain client details, supplier details and trading statistics, business plans, banking records, general financial information, research and development outputs. GSM technology can be used to call, transfer messagesand information, protect against hacking, and protect from unauthorized access. For mobile communication GSM transmit and receive data (Bauknecht, Tjoa&Quirchmayn.d.). Since GSM mobile enables companies to transfer information to the client, the company information has to identify with other competitive organizations. However, though this issue can be a required protection that this company should use to secure their information. In relation to the new product, large enterprises may easily hack their business information through GSM (BauknechtTjoa&Quirchmayn.d.). Criminals can easily use this technology to intercept communication about the organization plans, their informationpartners, and affiliates. The company should look for another private network that is no longer useful to the public. BioMed CEO Rachael, can secure information as private data to keep the communication between security researchers and software development experts private. Researchers are able the advance techniques and best practices for developing secure software. BioMed company uses the VPN software to secure information that passes through emails from the smart phones (Bauknecht, Tjoa&Quirchmayn.d.). Using VPN Software it is also another way to secure the company information. Company could secure its information using private network traffic over unsecured network. Additionally, organization VPN secures information of the company over the internet, to reach out information to their clients. Using VPN software is a sure way of securing information that being transferred through internet. This software allows the BioMed Company to send data between two devices across the internet. To secure information from an organization, VPN softwares easily allow for confidential use (Abrams, 2003). The BioMed Company can only use private network in order to pass information such as emailing and messages. VPN enables the company to connect with their client at their places, such as homes in a secure manner, a remote corporate serverusing internet (Abrams, 2003). It may help the organization acquire security to enable the network segment of the human resources department to be physically connect to the intranet. Interception is authorized if the business has made all reasonable effort to inform potential clients that their communication could be intercepted. BioMed Company could use this policy to provide security protection of organization to maintain their businesses and clients. Additionally, BioMed Company needs to protect their business information on GSM from vulnerable interception. Since the CEO Rachael has been using GSM for confidential purposes such as by emailing and communicating to other clients, it is important that the company move towards a more secure approach for keeping data.In some cases companies does require secure data to protect their information through technology. The companies often keep information locked in safe and only produce it when stakeholder needs it. This approach is meant to make the information confidential and private (Abrams, 2003). Information is often shared between organization and their stakeholders only, where the information cannot remain between organization and client. The approach often allows other competitors to follow their information from the source. BioMed Company CEO Rachel needs to needs state of the art technology that will keep information private. To protect information using the technology devise, hybrid secure calling is the best sources for securing BioMed Company information’s and keeping information confidential for their clients. 5.0 Legal and statutory requirements This part contains information details regarding the lawful and statutory requirements of organization. Corporate businesses provide a complete service to meet the legal requirements of the companies if they are to manage their stakeholders effectively. These are the rules of institution that form the legal foundation for the manner in which a company with third parties are amongst their own shareholders and directors (United States, 2002). Association must include the name of the company, and the register office located in Australia. When the company wants to launch the new register, the residential addresses the company will be needed. When BioMedCompany sets up their new product, many legal and statutory requirements may arise. Therefore, it is sometimes important to identify things that a company is legally obliged to do (Agarwal n.d.). When CEO Rachael is locating a private security organization the CEO needs to register the organization as a “legal entity.” All information she requires is found at the organization and “intellectual property Commission”. After registering the company on the new product that they want to launch, registry needs some proper clarification concerning the information and their products (Cushman, 1995). The company must be given a receipt to show a demand for payment from the limited company. Additionally, the company’s place of incorporation and all details that are required will be included. When the company is registered to the Revenue Services, the BioMed Company would register as a taxpayer with ARS (Ivey 2013). The company may begin the business on their new product, its mandatory register with maximum days that company has given. Australia Revenue services have terms and rule that guide the business company. Rachael, as a CEO manger of BioMed Company, should allocate a unique product that they want to launch (Agarwal n.d.), because it also needs protection to the company. The company should know what parts and where business is vulnerable, and the data that needs to be protected; the company can properly secure it. It is critical that the BioMed Company work with some professionals to audit the entire IT infrastructure, computers network, and mobile devices. What the company is required to do is prevent hackers from accessing the company network even where competitors have hired experts to hack the company information. Security is also required in house, because other compactors may access the company network remotely and siphon information. The vigilant employees, including consultants, partners, and vendors, shall make ensure that human error, is a big issue of data security breach is minimized (Cadle, Paul & Turner, 2010). The company sales team that existed five years ago is nothing like those the company has today. With smart phones that are today useful for transferring information of the company. In contrast, the company has to make it mandatory for employees to work securely alongside policies that guide their employees. This policy will help any information that occurs during their communication with other employees. The policies will ensure that all staffs are doing their part to secure the information (Cadle, Paul & Turner 2010). Telecommuters who only communicate with phones may also need a similar security to Rachael, while communicating with other stakeholders, and others working away network protection of the company’s (Unwala, 2014). The telecommuters may be operating openly with phones on the company stake holder networks, public networks at the coffee shops, or any other free network that available anywhere. It is important that this network be connected to a private secure data so that BioMed Devices Company communicates with their stakeholders securely. Competitors can use the organization technology that BioMed Devices designs for their convenience can be easily used against them to intercept information from other company employees using vulnerable mobile phones(Unwala, 2014). The company has to remain wary of communication between staffs and the client to identify how the company’s staffs are working outside the office with their phones while communicating with client (Collins, 2009). The company needs to secure communication to protect their information, so that it remains confidential to BioMed Company itself. Data should be classified as private without unauthorized disclosure, alteration, or destruction that could result in a moderate level of risk to the company (Collins 2009). By default, all institutional data that is not explicitly classified as restricted or public data should be treated as private data. A reasonable level of security controls should be applied to private data. 6.0 Hybrid calling To secure the company using private data security, the company should apply the hybrid secure calling system, which makes it easy to secure calls (Hurwitz, Kaufman, Halper, Kirsch n.d.). Hybrid security gives the company high protection against mobile interception in the company. Hybrid calling provides a combined encryption system that is highly secure for incoming and outgoing calls. Hybrid secure calling cannot only secure some few numbers, but it can secure all regular numbers across the world. It could also contain the company contact, client calling, and encrypted core technology (Hurwitz et al. n.d.). Hybrid security allows the company to build a secure information line for all the calls from the company and the client. It is secure and provides confidential information for any calls from the company to their stakeholders (Woody, 2013). Hybrid secures all information from where the client is and only works for Smartphone and across any wireless network. The company that uses this hybrid secure calling is able to call regional or international contacts, within the global network. The system allows a company to turn a device and GSM with ease. The client can dial the company contact without incurring high charges. However, secure mobile connect allows your device to Wi-Fi and to received calls. Having private networks are necessary for BioMed Company to secure the highly sensitive data. In the wrong hands, the data may enriche a group of hackers or may give competitors an edge over the company. The company also stands to lose the impending contract if it found that it has weak communication security. All these considered, BioMed Company needs to move fast towards integrating secure communication if it to continue operating effectively. Investor confidence may also wane if the company fails to secure information breaches. A security lapse would have massive effects for the company. 7.0 Conclusion Technology communication has become essential issues in current mobile environment and other networks. Since the technology has grown on networks, companies try to make their information private and confidential. This avoids any information hackers that may be targets of competitors. Wireless communication security is more sensitive to the company than building up the new idea for their client. To protect information from any third party, the company requires private data. The private data will allow BioMed company to develop new product under a secure environment that is not similar to what the company has develop over the last five years. Using private software will protect the company against interception, and it could provide best service to the client. Using hybrid calling with the best security will allow the company to make calls from inside and outside of the country. This will protect the information and keep it private and confidential for the stakeholders and the company. Hybrid security will enable the BioMed Devices Company to call international numbers across the world with the numbers accessible to the company and stakeholders only. 8.0 References Kuch, O. M. A. (2013). Eavesdropping protection in a inbox Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Making a Security Strategy for Securing Client Details of BioMed Case Study, n.d.)
Making a Security Strategy for Securing Client Details of BioMed Case Study. https://studentshare.org/information-technology/2065454-information-classification
(Making a Security Strategy for Securing Client Details of BioMed Case Study)
Making a Security Strategy for Securing Client Details of BioMed Case Study. https://studentshare.org/information-technology/2065454-information-classification.
“Making a Security Strategy for Securing Client Details of BioMed Case Study”. https://studentshare.org/information-technology/2065454-information-classification.
  • Cited: 0 times

CHECK THESE SAMPLES OF Making a Security Strategy for Securing Client Details of BioMed Company

Business of Asado Cafeteria

Running head: BUSINESS PLAN FOR ASADO CAFETERIA Business Plan for Asado Cafeteria 28th November 2012 Table of Contents Table of Contents 2 Executive Summary 4 Introduction 5 Objectives 5 Sales objectives 5 Mission 6 Keys to success 6 company Summary 7 company Ownership 7 Start-up Summary 8 Kitchen design and architectural plans 8 Guest rooms and tables 8 Manuals/Handbooks/Recipes 8 Pre-opening 9 Building/Infrastructure/Equipment 9 Start-up requirements 9 Start-up expenses 9 Start-up assets 10 Start-up funding 10 Business location and facilities 10 Services 11 Competitive comparison 11 Sales literature 12 Technology 12 Market analysis summary … 13 Market segments 13 Marketing programs 13 Word of mouth marketing 13 Local media 13 Pricing strategy 14 Annual costs 14 Annual variable costs in AED 14 Annual fixed costs in AED 14 Conclusion 15 Recommendation 15 References 16 Executive Summary Asado is a cafeteria that is aimed at providing quality food and excellent services to the local and foreign consumers who visit Dubai....
10 Pages (2500 words) Assignment

Promotional Strategy of Leeds Bradford Airport

In choosing the medium to use for advertisement of services, the company has to understand the medium that is common among the targeted customers (Harper, 2003, p.... Sales promotion Sales promotion activities involve providing incentives to the clients of the company to improve on the sales of the services.... Besides, the company should issue its flight tickets at much lower... Newspapers and magazines are also common and are effective in providing other details like the flight schedules....
8 Pages (2000 words) Essay

Company Analysis - Ipremier Case Study

Ipremier did not perform any better concerning the attack, if the hacker had any ill intentions with the company they would have enacted it and gone in time (Austine, Leibrock, & Murray, 2007).... hellip; Ipremier did not perform any better concerning the attack, if the hacker had any ill intentions with the company they would have enacted it and gone in time (Austine, Leibrock, & Murray, 2007).... It is very clear that the company was not prepared for the attack by the hackers in terms of their infrastructure, employees and their operational procedures proved to be too weak....
7 Pages (1750 words) Term Paper

Personal development plan

I will reflect upon and analyze some of my experiences to ascertain the best strategy for me to further develop my personality.... 678900Personal ProfileKey Skills Working under pressure to meet short deadlines Adapting quickly and effectively to changing circumstances and objectives Working independently or as part of a project team Career ProfileEmployerAppointmentDurationRoleMavis & Deacon HR ConsultantsSection Supervisor Jan 2004 - May 2005Assist manager in survey of client companyJ&J Pharma LtdAssistant to Deputy HR ManagerJun 2005 - Jan 2007All aspects of day to day workingAcademic AchievementsCourseInstitutionResultYearMBA (HRM)Greenwich Management SchoolOngoing2007BS (HRM)"1st Class2004A LevelSt....
7 Pages (1750 words) Essay

Business Continuity Issues Faced by LomaxLenses

The company has been performing well and healthy sales forecast has been made but in the absence of any strong checks on the sales, the company faces strong sales risks and may be experiencing unhealthy business continuity.... Hence, the company would be heavily affected by the severe effects of the absence of sales verification process.... The rationale behind suggesting the risk score is that the company has not put in place the sales verification process in the company....
15 Pages (3750 words) Research Paper

Trial Observation

Primarily, the questioning of the detective focused on the map discussing the distance from the point of arrest together with a school roughly 400 feet away as the witness narrated.... The point of arrest then began to be called the “18 and Allison” home.... hellip; This discussion talks that the detective was questioned about what was discovered in custody of the defendant....
5 Pages (1250 words) Essay

E-Activity in the Modern World

From the second e-Activity, identify a company (bank, car wash, travel agency, nonprofit, restaurant, etc.... Keeping that company in mind, select the client-side or server-side scripting you would most likely use, and why.... Imagine that you designed a Website for a client using JavaScript to make animated snowflakes fall on the page.... From the server or client side, the processing power can be a huge factor.... Or you can explain the client-side or server-side scripting you would not use, and why not....
10 Pages (2500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us