-
Ian M. Johnson posted a new activity comment 7 years, 11 months ago
DRP and BCP are both used situationally and customized depending on the needs of the companies that create and install them. The BCP is the preventative process put in place in preparation on how to respond to a disaster, while the DRP addresses the procedures to be followed during and after the loss. For example, the DRP deals with the…[Read more]
-
Ian M. Johnson commented on the post, Week 7 Questions, on the site 7 years, 11 months ago
Wenlin, you could also asks questions involving the quality of the work. Along those same lines, youc ould ask questions involving the benchmarks and goals that the company will reach. If they do not reach those goals, there could be penalties or a cheaper price to pay them. That way you can hold the company to a certain set of standards to the…[Read more]
-
Ian M. Johnson commented on the post, Week 7 Questions, on the site 7 years, 11 months ago
Yulun, what do you mean by loss of personal touch? Do you mean loss of personal touch on the product, processes, activities, and workload?
I like how you put risk of exposing confidential data because the company you bring in to take over work may have access to your confidential data. Also, that company could use the expertise they learn…[Read more]
-
Ian M. Johnson commented on the post, Week 7 Questions, on the site 7 years, 11 months ago
Sean one Risk of outsourcing that you could add would be that when you outsource, you risk losing touch with your processes and the skills that come with those processes that your company outsourced. One to cope with this risk is to stay involved and learn the techniques that the company you bring in employ to enhance your process.
-
Ian M. Johnson posted a new activity comment 7 years, 11 months ago
Outsourcing Questions:
1.Am I doing this because I want to simplify my life, or offer the market something new?
2.Am I doing this so I can “focus” on my “core” business?
3.How will this advantage me versus competitors? Would emerging competitors do this?
4.Can competitors do what I’m doing? Can this lead to a price war?
5.How will this…[Read more] -
Ian M. Johnson posted a new activity comment 7 years, 11 months ago
Explain common SLA issues identified by auditors
• Availability of service;
• Unrealistic Expectations
• Too complex for general employees
• Resource allocation
• Micro management of agreement
• Process mismanagement
• Change control issues
• Compliance
• Confidentiality and integrity of data; -
Ian M. Johnson posted a new activity comment 7 years, 11 months ago
The Pros of Outsourcing
• Increased revenue and returns on investment
• Lesser labor cost
• Improved realization of economics of scale
• Knowledge base for better innovation
• More management time – enables management to focus on core competencies
• Increases speed and the quality of delivery of outsourced activities
•…[Read more] -
Ian M. Johnson posted a new activity comment 7 years, 11 months ago
What controls can be implemented to mitigate the risks associated with outsourcing?
• Adopt a thin-client approach which allows you to mitigate the risk while saying compliant to the Data Protection Act
• For organizations that outsource parts of their business, there is a risk of losing their core skills as they become more reliant on the…[Read more] -
Ian M. Johnson posted a new activity comment 7 years, 11 months ago
Brou – I bet with a situation like this, the US agency came in and took control of the monitoring. The security team has their own role and they need to continue to improve their work. Another high volume task like this would not help with the roles that are already assigned to the security team. Considering the team had a terrible breach in…[Read more]
-
Ian M. Johnson posted a new activity comment 7 years, 11 months ago
Laly – this is very concerning. I work in a “closed area” and am able to bring my laptop into the area (most times). With that said, my work computer has a webcam. You will see many employees but a sticky note or some kind of coverage over their webcam. In fact, I have done that as well. I would guess that most people are doing this because…[Read more]
-
Ian M. Johnson posted a new activity comment 7 years, 11 months ago
Abhay – that is good insight. I did not think about Tulsa being a tornado valley but you are definitely right. With that said, I may change my choice from Tulsa to Denver. Denver has the mountains to block if from tornados and it is not near the coast so you do not have to worry about hurricanes. Denver also has a major airport and is not an…[Read more]
-
Ian M. Johnson posted a new activity comment 7 years, 11 months ago
I think that you rule out Miami Florida and Redlands, California due to the risk of natural disasters and forest fires. The backbone of the data center is power and network connectivity so I would choose a place with a geographic area that has access to a reliable power grid. I bet that Tulsa and Denver would both have access to a power grid so…[Read more]
-
Ian M. Johnson posted a new activity comment 7 years, 11 months ago
The article I read is about how many of the recent major breaches have something in common… In all of the major cyber security breaches, the path of the attack has been the common password because hackers know that the password is the weakest link in cyber security today. There are a number of reasons passwords are failing, including the reuse o…[Read more]
-
Ian M. Johnson posted a new activity comment 7 years, 12 months ago
Although, more and more companies are investing in cyber, cyber controls, best practices, etc., sometimes it takes companies to learn their lesson before they invest. I think big hacks like the Sony hack last year show companies that the investment is well worth it compared to the loss you may receive from an attack. It is unfortunate that…[Read more]
-
Ian M. Johnson posted a new activity comment 7 years, 12 months ago
It is frustrating to me that several aspects of our government system keeps getting hacked. We have some of the best infrastructure in the world, yet we can’t protect it. It is also crazy that you hear politicians and government officials say stuff like: Government hacking is fair game. Some of that information needs to be kept secret for…[Read more]
-
Ian M. Johnson posted a new activity comment 7 years, 12 months ago
This is interesting.. I know that Cyber Law is fairly new. I have read that police need very specific warrants when looking at hardware, software, logs, ect. For this specific case, I believe they would have to be looking for specific certain information during a certain time range. For example, they could look through text messages on 10/4/16…[Read more]
-
Ian M. Johnson posted a new activity comment 8 years ago
Here are some of the alternatives to VPN:
* PC Anywhere – Involves buying the (somewhat expensive) PC Anywhere software & installing/configuring it on the office PC and on the remote. Once purchased, there are no operational costs other than the occasional upgrade.
* GoToMyPC, from Citrix – subscription based model, where you pay a m…[Read more] -
Ian M. Johnson posted a new activity comment 8 years ago
I did some research to find out some advantages and disadvantages to the OSI model and below is what I found:
Advantages:
•Provides wide variety of choice.
•Does not depend on a specific computer system.
•interprets the product functionality at each-stage.
•Encrypts the data for security.
•Allows for the addition of multiple-…[Read more] -
Ian M. Johnson posted a new activity comment 8 years ago
Disadvantages:
-Complex Design
-Need for employees with high level understanding of VPN which can be costly
-Reliability can become a factor (need to choose a provider who can guarantee minimal downtime – costly)
-If it happens to be necessary to create additional infrastructure the solutions can become incompatible and cause technical i…[Read more] -
Ian M. Johnson posted a new activity comment 8 years ago
Laly – I accidentally posted this below as well. I meant to post it here. Great VPN advantages answer. I think a lot of your advantages depend on the planning that is needed in order to take the proper precautions that result in strong security.
Some disadvantages of a VPN is that VPN requires experienced employees that have knowledge with p…[Read more]
- Load More