What are some examples of how businesses protect themselves from unauthorised access to sensitive information?
IT security protocols should cover unauthorised and inappropriate use
Businesses can prevent unauthorised use of IT resources through:
Software tools; anti-virus, firewall and spyware
Password protection
Access rights; limited to selected staff
Screensavers for unattended computers
Screen location; prevent screen contents being visible
Inappropriate use of IT resources can be through non-work related activity, misuse of equipment and software licenses, damage to IT resources and installing unauthorised software.
Inappropriate use of IT resources can result in:
Wasted staff time
Fines for misuse of data and licenses
Increased business costs due to replacing damaged equipment.