In addition to other business management processes of business administrators, information is now considered an "asset" of the business, so it needs to be treated the same as marketing and sales processes. , produced... I couldn't stay up late to watch the quarterfinal match between France and Brazil in the early morning of July 2nd. Waking up at 6:30 a.m., I quickly went to the newspaper stand in front of the alley near my house because I was eager to know the results of the France-Brazil match.
On the newsstand, Tuoi Tre Express News reported the result: France beat Brazil 1-0. This information has been "consumed" by me without having to spend money to buy it. In just two seconds, Tuoi Tre Express News (which was very valuable to me when I was going to the newsstand to find information) was no longer attractive for me to buy. I already know the necessary information.
Back to businesses: every day there is a lot of business information that arises that businesses process, copy, distribute, and transfer to management departments...
And how much of that information is "consumed", as I was about the results of the France-Brazil match, while the corporate information carrier still leaves no trace of what was done? being used illegally?
How to prevent information from "evaporating" or falling into the eyes of others? Must develop and implement an information security plan for the business. Don't think this is the job of the information technology department. This is the job of business administrators.
In addition to other business management processes of business administrators, information is now considered an "asset" of the business, so it needs to be treated the same as marketing and sales processes. , manufacture…
Such a plan will at least touch on the following four areas of the business:
Infrastructure (including information technology infrastructure).
Applications in collecting, storing and processing long-standing business information of enterprises.
Business activities, information security policies, working environment, and even business information backup issues.
All employees in the enterprise are responsible for protecting information as a vital asset of the enterprise (not just protecting the security of information carriers) and this must be seen as a component of business culture of the enterprise.
Why is it necessary to have an information security plan? Suppose the director needs to know certain information, but each department provides different information, what happens? Executives will be skeptical about the quality of information in the business, and this intermittent information will confuse them rather than using it with confidence.
Is there someone who repairs the data? Employee entered data incorrectly? Does the software being used to process data not properly represent the company's calculation processing rules? At that point, instead of making a decision or having a conclusion, a doubt arises in the executive's heart. There is something very unsafe about them being able to use the information they have to make decisions.
Therefore, to feel "safe" when using information, businesses must have an implementation plan, not a system of patches and late clicks of the tongue.
The issue of "information security" in this article is addressed at two levels. Safety here is not just about preservation and security. When it comes to information security, we often understand it in a narrow sense, which means keeping information absolutely confidential. However, this is only a necessary condition of security requirements, a defensive information strategy commonly found in businesses.
To gain the initiative, information security must be understood in a broader sense: information must be provided to administrators promptly, completely and accurately with absolute confidentiality requirements. Only then can information be truly valuable, but if businesses only worry about keeping the information they have without seeing this issue as a "master system integrated with activities within the business". ” the dream of information security in business seems very far away!
According to TBKTSG