Cyber Crime Protection and Global Business Travel

CYBER CRIME PROTECTION AND GLOBAL BUSINESS TRAVEL 4

CyberCrime Protection and Global Business Travel

CyberCrime Protection and Global Business Travel

Toenforce the security of data and the company’s system, it isimportant that all traveling employees follow a stringent securityprocedure. The employees of the company will have be required toplace a notice of travel at least one day before traveling with thecompany’s digital content and devices. All the devices will beconfigured for connectivity to a cloud server where all the contentthey will need will be uploaded. According to Buyyaet al (2011), this will protect the company from the loss of data andcontent in case of a security breach on the journey. The employeeswill present the devices they will be carrying to the IT departmentfor security evaluation and installation of extra security features.

Differentsecurity features will be installed depending on the countriesemployees will be visiting. This is because different countries posedifferent security threats (Brenner,2010). While the hardware is the mostrisky in some countries, the software and content is risky in othercountries. Most importantly, secure content and access details areespecially the most risky, especially in countries with competitorcompanies (Spencer, 2013). Before leaving, employees will have to becleared by the IT security team for risky content and devicescarried. They will be provided with new login details to company’scontent. According to Clough (2010),such a measure will allow monitoring oftheir login sessions for any irregular access. Moreover, employeeswill access any sensitive data and information from the cloud serversof the company.

Oneof the resources will be the travelling computers that are designedfor employees on the move. The cloud server is the other resource thecompany that stores the most material information of the company.According to Buyyaet al (2011), cloud computing will help the firm by allocating securelogin details to the authorized employees. The reliance on thesecurity measures will strengthen my ideas on the use of securitydevices and backing up information on the cloud computing platforms.

References

Brenner,S. (2010). Cybercrime:Criminal Threats from Cyberspace.SantaBarbara, CA: ABC-CLIO

Buyya,R., Broberg, J., &amp Goscinski, A (2011).&nbspCloudComputing: Principles and Paradigms.New York, USA: Wiley Press

Clough,J. (2010). Principlesof Cybercrime.Cambridge: Cambridge University Press

Spencer,T. (2013). PersonalSecurity: A Guide for International Travelers.New Tork: CRC Press