This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Business

Business considerations before implementing security policies

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Business considerations before implementing security policies

         An organization requires security policies to protect it from breaches or sudden hazards. Organizational security can be enhanced with the help of security policies. In the case of large as well as small businesses, security policies provide guidance to employees, customers, contractors, and vendors (Siponen, Pahnila & Mahmood, 2010). Every business should consider securing its information, and it must be one of their priorities. However, organizations must consider certain factors before implementing security policies. Maintaining standards is a necessity, and other related factors should be considered.

An outline of the business considerations

A range of factors has been outlined that should be considered before implementing the policies. These are as follows-

  • Identification of the business issues- The organization is supposed to identify the reason behind the conflict, and based on the analysis, it is necessary to implement the policies. The organization is supposed to maintain a standard, and therefore, practices should be aligned with the objectives of the firm.
  • The strategic focus of the organization- It mainly implies the specific vision and mission of the firm. Every organization works towards fulfilling a particular mission, and while creating a new strategy, it is necessary to align the strategy with the vision and goals.

    Don't use plagiarised sources.Get your custom essay just from $11/page

  • The need for confidentiality and integrity- security policies should be implemented after identifying the need for confidentiality in a business. For instance, a government organization needs to secure its data and resources to stop unauthorized access. Therefore, confidentiality is a vital consideration. The business needs to identify the type of data and resources that require safeguarding.
  • Comparison with policies and standards of other organizations- Every organization has a unique set of vision and mission based on which they implement standards and policies. Standards and policies can become the foundation of the firm. The necessity of comparing the standards with other organizations arises because it will provide an insight regarding the real outcomes of implementing a particular standard or policy (Peltier, 2004).

 

Importance of considering the business factors  

 

The business considerations would allow the leaders to think through the process and prevent threats on time. Business leaders can create awareness among the employees regarding the need for confidentiality. Research suggests that 40% of breaches occur because employees remain uninformed. Hence, businesses are supposed to consider this need to stay away from potential threats. Technology infrastructures are evolving every day, and a threat to networks and systems are rising at an exponential rate. Therefore, businesses must implement policies after reviewing the outcomes of a particular policy and standard in another organization. The cross-organizational comparison would help the business to gain deeper insights and understanding regarding the real results of policy implementation. A business must create a culture where employees comply with the standards and policies (Siponen, Mahmood & Pahnila, 2014). Legally enforceable policies must be enforced uniformly. Thereafter, businesses should consider reviewing or modifying policies based on changing situations and circumstances. It would be beneficial for the firm to review policies regularly because it is supposed to keep up with changing trends.

 

 

References

Siponen, M., Pahnila, S., & Mahmood, M. A. (2010). Compliance with information security policies: An empirical investigation. Computer43(2), 64-71.

Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & management51(2), 217-224.

Peltier, T. R. (2004). Information security policies and procedures: a practitioner’s reference. Auerbach publications.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask