Information Technology Security Standards

Subject: Tech & Engineering
Pages: 2
Words: 559
Reading time:
3 min
Study level: College

Privacy issues are acute from the point of view of large companies, which often have a lot of personal data. The relevance of this area and the need for its financing are reinforced by the constant development of various fraudulent schemes that can steal information up to electronic money. An information security policy is a set of rules, procedures, practices, and guidelines in the field of data protection used by an organization in its activities. Many practices are categorized by preventing, detecting, and resolving various security problems (Sword & Shield Enterprise Security, n.d.). Service complexes are created for various specific tasks, which involve proactive and reactive control measures and compliance with high-quality standards. Technological progress is the driving force behind the competitiveness of many companies, but at the same time, these technologies are used not for the benefit of organizations but as a threat (Absolute Performance, 2022). Threat differentiations provided by specialized companies can help find comprehensive solutions to mitigate risks and deal with possible consequences.

The security policy is built primarily on data confidentiality, integrity, and availability. The requirements are often presented in the form of a document that must be constantly updated due to the rapid development of technology and, accordingly, the level of threats (Paloalto, n.d.). However, not every company can identify and put together all the experiences of fighting cyber threats. General safety performance standards are introduced, differentiated by specific tasks, and regularly updated at the city and national levels (New York State, 2022). All commonly used technologies are added here, including wireless communications, mobile devices, reporting procedures, and control systems (New York State, 2022). Such standards should be applied at the company’s corporate level and as individual recommendations for each employee.

Codes of rules also exist at a higher level, the regulation of which is already within the competence of national structures. For example, HIPAA has its standard for the privacy of personally identifiable health information and regulates information protection in the medical field (HHS, 2013). They regulate not only the legal basis for violating the security of such information but also the requirements for the quality of its preservation, with the mandatory implementation of technologies, including computerized systems, such as CPOE systems for entering medical prescriptions, EHR electronic medical records, as well as radiological, pharmaceutical and laboratory systems ( HHS, 2013). The IT industry can create complex products to meet the specific needs of particular business areas or industries.

At the same time, threats have a different nature of origin, which may be unique to a particular sector or classified according to the technology used. Distinguish internal sources of problems, including the lack of policy and documentation of access to resources by employees, and external sources, implying threats on the network, public services accessing the Internet, and information hosted on vulnerable media (Absolute Performance, 2022). Before implementing any system at the organizational level, it is always necessary to have accompanying control measures that track changes, block suspicious actions, and much more, provided for by the specifics of the tasks being solved. Security systems development is essential for any company, given the need to comply with social responsibility requirements. At a minimum, any organization stores employees’ personal files and, in many cases, various information about customers, which in all respects is confidential data, the protection of which is almost always documented in cooperation agreements.

References

Absolute Performance. (2022). IT Challenge Roadmap.

HHS. (2013). Summary of the HIPAA Security Rule.

New York State. (2022). ITS Security Policies.

Paloalto. (n.d.) What is an IT Security Policy?

Sword & Shield Enterprise Security. (n.d.) Network Security Program for Financial Institutions. Web.