Question details

Ethics and Security 2
$ 25.00

Part 1

Develop a 1,400-word summary describing the challenges businesses have in securing data in today's technological environment and what businesses should do to mitigate or minimize risks: 

  • Include risks and threats of company data.
  • What policies/procedures should be implemented for the handling of data ensure data protection and business continuity?
  • Include in text citations and references.

Format your assignment consistent with APA guidelines. 

Save as a Microsoft® Word document saved under the following format: Lastname_Course#_W2.doc.

 

Part 2

Develop a 175-word memo announcing the new security policies to all employees taking effect in one month following mandatory training. Search online for a Microsoft® memo template. 

Create an eye-catching memo that is clear and to the point concerning the new security policies. APA formatting is not required for this part of the assignment.

Use the following features of Microsoft® Word in your memo:

  • A Microsoft® Word memo template.
  • Either a bulleted or numbered list of the new security policies/procedures, and bold or changed font color so this list is highly visible.
  • Highlight the effective date so it stands out.
  • Insert an image that is relevant to the memo content. Images must also be cited and referenced.

Save as a Microsoft® Word document saved under the following format: Lastname_Course#_Memo.doc.

Available solutions
  • Business Securing Data both part
    $25.00

    Business Securing Data (Student Name) (Course Name) Introduction In this paper, we provide a summary that describing the challenges businesses have in securing data in today's technological environment. We will also discuss about the risks and threats of company data. Some policies/procedures also discuss these policies/procedures should be implemented for the handling of data ensure data protection and business continuity. Now day’s companies have to face lot challenges for securing information in the technological environment. Some of the major securing data issues

    Submitted on: 04 Apr, 2018 05:18:06 This tutorial has not been purchased yet .