1 Jun 2022

53

Business Systems Analysis and Design

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 680

Pages: 2

Downloads: 0

Basic Security Considerations 

The grocery business in question has adopted the use of social media and online marketing as its technological solutions must come up with best practices to ensure privacy and security of their data. This is important since these technological solutions apart from helpful in the running of businesses are liable to misuse and abuse which can end up compromising the grocery business. This part seeks to find out the best strategies to implement to ensure that such breach and compromise of data is not encountered.

Businesses across the globe are constantly adapting to technological solutions so as to increase sales through the effectiveness of such technological solutions to reach a broad range of customers. As the grocery business adapts this technology, it is important for the owner to be well aware that breach of security and privacy is a widespread practice which has cost many business enterprises billions of losses through cyber-crime. Cyber-criminal activities happen when criminals infiltrate into the technological settings of companies where they hack them to get sensitive and confidential information (Gangopadhyay & Dhar, 2016). More so the cyber criminals can decode passwords and thus con unsuspecting customers by posing to be the genuine company. This is done through the creation of similar social media sites and online marketing platforms where they make a killing out of unsuspecting clients. Furthermore, the cyber criminals are able to siphon large sums of monies from company’s account at ease which is facilitated by the technological advancement and knowledge (Gangopadhyay & Dhar, 2016). This, therefore, acts as a wake-up call for the owner of the grocery store to come up with ways of reducing or eliminating such occurrences in his business.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Security features that social media and online marketing platforms should have. 

As discussed, social media and online marketing technological solutions are very liable to cyber-attack. More so social media and online marketing platforms can be compromised by the employees through accidental tweets and posts which may affect the business negatively. Additionally, if the social media and online marketing accounts are not used regularly, viruses and spams may be generated and which may be passed to clients who would reduce their trust levels for the grocery business (Kumar & Deepa, 2016). This means that for one to take full advantage of the advantage, these two solutions offer there is a need to make sure that they have security features. Theses security features are important since they ensure that three is no security breach which may be an expensive affair. The security features to include are setting some privacy policies which are known to all the employees. Furthermore, there is a need to limit the number of staff who have publishing rights and passwords in the social media and online marketing platforms (Russell, 2017). More so the owner needs to monitor the happenings in the accounts as well as conducting regular audits to ensure that no security gaps are present.

What to consider in terms of security and privacy in regard to third party vendors 

Businesses usually consider third party vendors in the technological market who are more innovative by providing add -ins. These third party vendors can come in handy when dealing with the privacy and security considerations in a company or business. The third party vendors can provide guidance on best practices as well as set safety measures in the handling and dissemination of a company's sensitive information (Da Silva, 2017). Furthermore, they can provide software which can track information as well as conduct safety reviews and audits to ensure continued safety and security.

Internal safeguards to guard against loss and misuse of company’s data 

Companies are faced with cases of loss of and misuse of data through intentional, malicious or accidental occurrences. To ensure the safety of such data companies usually, come up with internal safeguards to avert this loss. The internal safeguards include passwords and codes which are given to selected employees to enable an easier tracking of any eventuality (Ernst & Young, 2011). Furthermore, companies conduct regular reviews and audits so as to establish the status of security to prevent breaches.

References

Da Silva, T. (2017). The Importance of Third-Party Vendor Risk Management Programs . The Federal Reserve System. Retrieved from https://www.communitybankingconnections.org/articles/2017/i1/third-party.

Ernst &Young. (2011). Data loss: Keeping your sensitive data out of the public domain. Retrieved from http://www.ey.com/Publication/vwLUAssets/EY_Data_Loss_Prevention/$FILE/EY_Data_Loss_Prevention.pdf.

Gangopadhyay, S. & Dhar, D (2014). Social Networking Sites and Privacy Issues Concerning Youths. Global Media Journal-Indian Edition, 5(1).

Kumar, S. N. &Deepa, S. K. K (2016). On Privacy and Security in Social Media – A Comprehensive Study. Procedia Computer Science, 78(2016):114-119.

Russell, J. (17 May 2017). 5 Social Media Security Risks and How to Avoid Them. Hootsuite Media Inc. Retrieved from https://blog.hootsuite.com/social-media-security-for-business/.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Business Systems Analysis and Design.
https://studybounty.com/business-systems-analysis-and-design-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

How AI Can Help Retailers Solve Business Problems

The global marketplace is currently more integrated than ever before. This situation presents a never-before experienced opportunity for retailers. Multinational organizations whose sole basis is the internet have...

Words: 2700

Pages: 5

Views: 138

The Natural Organizational Model and the Informal Groups

The nature of an organization is based on different factors such as the environment it is set up in. also, the type of activity it undertakes. This paper will examine the natural organizational model, the informal...

Words: 3009

Pages: 10

Views: 239

Why Pinkberry should focus on making orange and yellow the two prevailing colours

The fact that Pinkberry has evolved from a storefront to a nationally recognized brand makes this franchise of frozen dessert yogurt shops an example to be followed. Yes, the personality of a brand created a platform...

Words: 582

Pages: 2

Views: 93

Ford Motors: Board Presentation For Electric and Hybrid cars Production

Executive Summary The motor vehicle industry in America and worldwide is highly competitive with major players no longer enjoying the dominance that they had had before. Innovation and identification of trends...

Words: 1088

Pages: 4

Views: 129

Home Remodel Project Plan

Project Overview Home remodeling is one of the notable key projects undertake through project management, as a project manager is expected to come up with a clear plan that would help in meeting the expected...

Words: 2152

Pages: 8

Views: 68

How Airbnb Achieved Success

Hospitality industry includes firms that provide lodging and dining services for customers. Many of the businesses in the travel and hospitality industry offer customers with prepared meals, accommodation, snacks,...

Words: 906

Pages: 3

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration