Importance Of Technology Security Education

By Samit Banerjee
12-04-2019
189

Q. Discuss the importance of user technology security education within

organizations. What topics should be included in security education

and training?

 

Answer

 

Technology has replaced many areas of human operation. Organisations of various size and enterprise of different capacities relies upon technology for better productivity and output. Technology plays a great role in data and information management.

Data when gets structured and organized, takes the form of information. This information is used and circulated for relevance and purpose using Information Systems. All the systems of information sharing and processing are connected by means of Internet. This is the point where technology security plays a vital role.

 

Technology security is required for the following reasons:

a. Protection of servers, data centers and admin systems from cyber threats of hacking,

b. Prevention of data and information loss and threat due to malicious cyber criminal activities,

c. Prevention of chances of becoming victim to phishing. This cyber fraud scheme generally taps employees to steal confidential data of users, customers and employees.

d. Prevent system crash and network failures, and,

e. Prevent unwanted intrusion of cyber criminals in the internal network architecture of any organization.

 

Organisations consist of employees belonging from various specific fields with specific expertise. They can be technical or non technical in their experience and knowledge. But to ensure a proper technology security, all employees must have proper training and knowledge about the security features associated with the technology they use.

 

Technology security education for all users in any organisation is must due to the following reasons:

a. To make aware of the basic know-how regarding technology security,

b. To make them able to identify the threats and issues related to technology security,

c. To make them aware of the ongoing threat and attack pattern as far as cyber security is concerned,

d. To provide them awareness regarding the updates and improvements in the field of Internet and technology security,

e. To train them about using firewall and other hack preventive interfaces thus ensuring cyber safety.

 

Organisations arrange Security Awareness Training (SAT) and campaigns to train and prepare their employees to prevent cyber threats and ensure complete network security. Such trainings must be imparted to all employees of an organisation irrespective of his of her belonging from a technical or non-technical field.

 

Such training should be given the form of security education by including few rules and modules like:

a.    Regular training sessions in fixed frequencies,

b.    Updated modules and lessons regarding cyber security,

c.    Practical training and development for better understanding of the parameters related to cyber security,

d.    Clear vision formation of the practices and provisions utilised for technology and server security in large organizations,

e.    Provide overall reviews of cyber attack incidents in other organisations,

f.     Introduction of this refresher manual which can be accessed from anywhere at any point of time using online training benefits.

 

Data gives the platform of operation to all organisations. Be it small scale, mid range or corporate giants, data is required by all organisations for their functionality. Data servers and data centers are responsible for transmission and circulation of data throughout the network of users, clients or customers and employees all around the globe. If such important network gets vulnerable to cyber security attacks and threats, then it can result to great data, information and resource loss. To avoid all such organisational risks, proper training and education of the users in an organization is required in the fields of technology and Internet security.

 

Reference:

 

 

"Manage IT Security Risk with a Human Element". Dell.com. Retrieved 2012-03-26.

Cook, M. A. (1996). Building enterprise information architectures : reengineering information systems. Hewlett-Packard professional books. Upper Saddle River, NJ, Prentice Hall.

 "Information Security Qualifications Fact Sheet" (PDF). IT Governance. Retrieved 16 March 2018.



Related Tutorials