Your boss mentions that recently a number of employees have…

Your boss mentions that recently a number of employees have received  calls from individuals who didn’t identify themselves and asked a lot of  questions about the company and its computer infrastructure. At first,  he thought this was just a computer vendor who was trying to sell your  company some new product, but no vendor has approached the company. He  also says several strange e-mails requesting personal information have  been sent to employees, and quite a few people have been seen searching  your company’s trash dumpsters for recyclable containers. Your boss asks  what you think about all of these strange incidents. Respond and be  sure to provide recommendations on what should be done about the various  incidents. It must be in APA format. 250 word s

Title: Addressing Security Incidents to Protect Company’s Assets

Introduction:
Security incidents such as unidentified phone calls, phishing emails, and dumpster diving can pose a serious threat to a company’s computer infrastructure and overall security posture. It is imperative to assess these incidents appropriately and develop effective strategies to mitigate the associated risks. This paper aims to provide recommendations on how to address the given incidents and protect the company’s assets.

Unidentified Phone Calls:
The unidentified phone calls raise concerns about potential attempts to gather sensitive information about the company. It is essential to treat these calls as suspicious and take appropriate measures to mitigate any potential risks. Recommendations for addressing this issue include:

1. Employee Education: Conduct comprehensive training sessions to raise awareness among employees about potential social engineering tactics and the importance of not disclosing sensitive information over the phone.

2. Caller ID Authentication: Implement a caller identification system to authenticate incoming calls. This system should validate and display the caller’s identity before allowing employees to answer.

3. Incident Reporting: Establish a protocol for reporting suspicious phone calls. Employees should be encouraged to report any unidentified calls, providing as much detail as possible to aid in subsequent investigations.

Phishing Emails:
The strange emails requesting personal information indicate a potential phishing attack. Such attacks often seek to trick employees into divulging confidential data. The following recommendations can help address this issue:

1. Email Filtering and Spam Detection: Deploy advanced email security solutions that employ filters and machine learning algorithms to detect and block phishing emails. Regularly update and maintain these systems to adapt to evolving threats.

2. Employee Awareness: Conduct regular training sessions to educate employees on recognizing and responding to phishing emails. Provide practical examples of how to identify suspicious emails, such as checking for misspellings, unfamiliar senders, or requests for personal information.

3. Multi-factor Authentication (MFA): Implement MFA as an additional layer of security when accessing sensitive company resources. This will minimize the impact of compromised credentials resulting from successful phishing attacks.

Dumpster Diving:
The act of individuals searching for recyclable containers in company dumpsters raises concerns about potential unauthorized access to confidential information. The following recommendations can help mitigate this risk:

1. Secure Shredding: Implement a strict policy for securely shredding all confidential documents before discarding them. This should include employee training, clear guidelines, and designated secure containers for paper disposal.

2. Surveillance Measures: Install security cameras near dumpsters to deter unauthorized access. Constant monitoring of these cameras will help identify individuals engaging in suspicious activities.

3. Physical Security Assessment: Conduct a thorough assessment of the company’s physical security measures, including access control systems, fences, and security patrols. Identify any vulnerabilities and address them appropriately.

Conclusion:
Addressing the incidents of unidentified phone calls, phishing emails, and dumpster diving requires a multi-layered approach that combines employee education, technological solutions, and physical security measures. Implementing the recommended strategies will help protect the company’s assets, mitigate risks, and maintain a strong security posture. Regular review and updates to these measures are essential to stay ahead of emerging security threats.

Do you need us to help you on this or any other assignment?


Make an Order Now