1 Jun 2022


Business Systems Analysis and Design

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 680

Pages: 2

Downloads: 0

Basic Security Considerations 

The grocery business in question has adopted the use of social media and online marketing as its technological solutions must come up with best practices to ensure privacy and security of their data. This is important since these technological solutions apart from helpful in the running of businesses are liable to misuse and abuse which can end up compromising the grocery business. This part seeks to find out the best strategies to implement to ensure that such breach and compromise of data is not encountered.

Businesses across the globe are constantly adapting to technological solutions so as to increase sales through the effectiveness of such technological solutions to reach a broad range of customers. As the grocery business adapts this technology, it is important for the owner to be well aware that breach of security and privacy is a widespread practice which has cost many business enterprises billions of losses through cyber-crime. Cyber-criminal activities happen when criminals infiltrate into the technological settings of companies where they hack them to get sensitive and confidential information (Gangopadhyay & Dhar, 2016). More so the cyber criminals can decode passwords and thus con unsuspecting customers by posing to be the genuine company. This is done through the creation of similar social media sites and online marketing platforms where they make a killing out of unsuspecting clients. Furthermore, the cyber criminals are able to siphon large sums of monies from company’s account at ease which is facilitated by the technological advancement and knowledge (Gangopadhyay & Dhar, 2016). This, therefore, acts as a wake-up call for the owner of the grocery store to come up with ways of reducing or eliminating such occurrences in his business.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Security features that social media and online marketing platforms should have. 

As discussed, social media and online marketing technological solutions are very liable to cyber-attack. More so social media and online marketing platforms can be compromised by the employees through accidental tweets and posts which may affect the business negatively. Additionally, if the social media and online marketing accounts are not used regularly, viruses and spams may be generated and which may be passed to clients who would reduce their trust levels for the grocery business (Kumar & Deepa, 2016). This means that for one to take full advantage of the advantage, these two solutions offer there is a need to make sure that they have security features. Theses security features are important since they ensure that three is no security breach which may be an expensive affair. The security features to include are setting some privacy policies which are known to all the employees. Furthermore, there is a need to limit the number of staff who have publishing rights and passwords in the social media and online marketing platforms (Russell, 2017). More so the owner needs to monitor the happenings in the accounts as well as conducting regular audits to ensure that no security gaps are present.

What to consider in terms of security and privacy in regard to third party vendors 

Businesses usually consider third party vendors in the technological market who are more innovative by providing add -ins. These third party vendors can come in handy when dealing with the privacy and security considerations in a company or business. The third party vendors can provide guidance on best practices as well as set safety measures in the handling and dissemination of a company's sensitive information (Da Silva, 2017). Furthermore, they can provide software which can track information as well as conduct safety reviews and audits to ensure continued safety and security.

Internal safeguards to guard against loss and misuse of company’s data 

Companies are faced with cases of loss of and misuse of data through intentional, malicious or accidental occurrences. To ensure the safety of such data companies usually, come up with internal safeguards to avert this loss. The internal safeguards include passwords and codes which are given to selected employees to enable an easier tracking of any eventuality (Ernst & Young, 2011). Furthermore, companies conduct regular reviews and audits so as to establish the status of security to prevent breaches.


Da Silva, T. (2017). The Importance of Third-Party Vendor Risk Management Programs . The Federal Reserve System. Retrieved from https://www.communitybankingconnections.org/articles/2017/i1/third-party.

Ernst &Young. (2011). Data loss: Keeping your sensitive data out of the public domain. Retrieved from http://www.ey.com/Publication/vwLUAssets/EY_Data_Loss_Prevention/$FILE/EY_Data_Loss_Prevention.pdf.

Gangopadhyay, S. & Dhar, D (2014). Social Networking Sites and Privacy Issues Concerning Youths. Global Media Journal-Indian Edition, 5(1).

Kumar, S. N. &Deepa, S. K. K (2016). On Privacy and Security in Social Media – A Comprehensive Study. Procedia Computer Science, 78(2016):114-119.

Russell, J. (17 May 2017). 5 Social Media Security Risks and How to Avoid Them. Hootsuite Media Inc. Retrieved from https://blog.hootsuite.com/social-media-security-for-business/.

Cite this page

Select style:


StudyBounty. (2023, September 16). Business Systems Analysis and Design.


Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Ford Motors: Board Presentation For Electric and Hybrid cars Production

Executive Summary The motor vehicle industry in America and worldwide is highly competitive with major players no longer enjoying the dominance that they had had before. Innovation and identification of trends...

Words: 1088

Pages: 4

Views: 103

Home Remodel Project Plan

Project Overview Home remodeling is one of the notable key projects undertake through project management, as a project manager is expected to come up with a clear plan that would help in meeting the expected...

Words: 2152

Pages: 8

Views: 41

How Airbnb Achieved Success

Hospitality industry includes firms that provide lodging and dining services for customers. Many of the businesses in the travel and hospitality industry offer customers with prepared meals, accommodation, snacks,...

Words: 906

Pages: 3

Views: 37

Product and Target Market Planning

Product Concept Tesla Model S is an all wheel drive sedan that was introduced to the market in October 2014. The model is faster than its predecessors and can accelerate from zero to sixty miles in an hour in...

Words: 614

Pages: 2

Views: 336

Financial Management Cycle

Financial management is crucial to effectively oversee organizational operations because the process facilitates the monitoring and evaluation of corporate activities and budgets. Corporations have a constant cash...

Words: 369

Pages: 1

Views: 177

Marketing Plan for Speedy Delivery: a company that offers delivery services to other corporations and organizations

1.0 Executive Summary Speedy delivery is a company that offers delivery services to other corporations and organizations. The company provides fast and high-quality services to consumers. Some of the delivery...

Words: 2537

Pages: 13

Views: 72


Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.