Answer: Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data .This is the presentation of the summary of what the organization should do to prevent this from happening again.
Explanation:
The <u>objective of information security i</u>s to maintain a reasonably secure environment as well as the proper use of resources and risk management, in order to preserve the availability, integrity and confidentiality of information and the assurance of business continuity. Also :
- To manage information security risks to keep them at acceptable levels.
- Protect information assets.
- Train public servants, suppliers and stakeholders about the importance of data protection.
- Monitor compliance with information security requirements.
- Implement corrective and improvement actions.
Since the current trend is that <em>employees take their personal devices to the office,</em> in addition to giving them personal use, the most common is that they use it for the <em>review of corporate email and as support for the tasks of their daily work.</em> Therefore, proper management of the devices that are connected must be defined, in order to use the applications and information according to the provisions of the policies established by the company.
The most common threats are :
- Unofficial applications. (Can ask you for permitions and steal your private information)
- Public WIFI.(Can enter in to your network and steal your private information)
- Phising.(The most common is an email that force you to open a message which links to a malicious website to steal your personal information)
Always is important to protect the device with one or several of this advices:
- Secure access networks.
- Access to information must be restricted in a way that guarantees that only those people who are really qualified to do so can access the information.
- Write a security policy. Define which devices can access corporate information.
- Protect WiFi connections.
- Protect against malware.
In this scenario the <em>company should </em>make an update of all information and networks ,the installation and configuration of firewalls and encryption of corporate confidential information.
The best way is to train and make the employees of the company aware of the risk of sharing information and the legal punishment that they can have if they do it.
Every company must have a standardized risk plan to solve these types of situations before more information is leaked(can apply some of those mentioned above).
Answer:
E) It would not necessarily be considered high elsewhere.
Explanation:
The US inflation rate during 1979 was 11.26%, during 1980 it was 13.55%, and during 1981 it was 10.33%. These numbers may seem very high for American standards, but they aren't really high once you compare them to other nation's inflation rate.
For example, if we look at what is happening in two South American countries right now; Currently Venezuela is facing a hyperinflation measured by millions, and Argentina's current inflation rate is around 60%.
Back in the 1980s, hyperinflation rates were much more common. Argentina, Bolivia, Brazil, Mexico, Peru and Nicaragua, all suffered from hyperinflation (inflation rates in the 1,000s).
The US dollar is considered a very stable currency, that is why an inflation rate of around 10% was considered extremely high for American standards, but not so high compared to the rest of the world.
Pay everything on time and Keep you credit score above 700.
Check all your bank statments
Answer:
The gross profit method of inventory valuation is not valid when
c. the gross margin percentage changes significantly during the year.
Explanation:
Gross Profit Method:
It is such method that is used to determine the value of ending inventory in a specific period.
- The option a, b and d are valid as this method is used when there is substantial increase in the quantity of inventory or in the cost of the inventory during the year. Moreover, it is also used to calculate the amount of ending inventory that is effected by a disaster such as fire, theft etc.
- The option c is not valid because it is not used when the gross margin percentage changes significantly during the year as gross profit method is only used to determine the amount of an ending inventory.
<u>Entrepreneur I admire:</u>
Richard Branson also known as Old Beardie founder of Virgin Galactic is the person I admire as an entrepreneur. The following strategies have been followed by him,
- The perception on risk has to be unique
- Passion for business has to be injected so that a thorough analysis about the industry and competitor can be done
- A focus on core competencies will help in enhancing the best skills
- Innovation and expansion are essential
- The right amount of capital has to invested at the right time so that the money is not not wasted on unproductive activities.