jpurdy@ohiochristian.edu
Forum Replies Created
-
AuthorPosts
-
jpurdy@ohiochristian.eduParticipant
Yes, the remote work policy has matured significantly during Covid as so many workers had to work remotely.
As AI matures, do you anticipate that companies will need policies around AI? If so, what type of safeguards would you anticipate?
jpurdy@ohiochristian.eduParticipantAre there any of these mitigating policies that you consider to be more important than others?
jpurdy@ohiochristian.eduParticipantYes, the algorithms in cryptography are important to keeping data away from eyes which aren’t authorized to read it.
Here’s a good article on it:
https://www.triskelelabs.com/blog/the-role-of-cryptography-in-information-security
jpurdy@ohiochristian.eduParticipantYes, access controls are important to not only put in place but also to keep current as people take on new roles in the company.
Here’s a good article on them:
https://www.csoonline.com/article/564407/what-is-access-control-a-key-component-of-data-security.htmljpurdy@ohiochristian.eduParticipantHere is another good article on security a network:
jpurdy@ohiochristian.eduParticipantWe can get so focused on our food and material things that we forget to nurture our soul. Just this morning, I learned that one of my cousin’s daughters got engaged this week. In the post, they had sweet pictures of the future bride and groom (as well as the ring), but they also asked for God’s blessing on their life together. What a great way to start an engagement! I hope they continue to nurture their relationship with God.
jpurdy@ohiochristian.eduParticipantYes, as in so many ways, Christ sets a great example for us when he was tempted and had trials. It serves as a great reminder that even though we have trials, God is always there for us.
jpurdy@ohiochristian.eduParticipantExcellent discussion of the different types of storage. If security is a concern, which types lend themselves to being secure and which ones would you avoid?
jpurdy@ohiochristian.eduParticipantI love your analogy of a plant needing water to our souls needing the Word of God. We need continued care and growth in our Christian life.
At the same time, we need to remember and try to emulate the love and forgiveness that Christ showed to others rather than judging others.
jpurdy@ohiochristian.eduParticipantMarcena,
Great point about educating staff. My company regularly provides mandatory security training such as watching for phishing emails. Then they follow up by sending out some “test” phishing emails to see if people report it as phishing.
jpurdy@ohiochristian.eduParticipantHere’s a good article on the OWASP security principles.
https://www.veracode.com/security/owasp-top-10
One of these principles is a broken authentication system such as if an authentication system has a back door or other hole in it. If that happens, people will discover it and enter without actually being an approved user. A great way to mitigate against this is multi-factor authentication.
jpurdy@ohiochristian.eduParticipantYes, I am always amazed to see how many things were prophesized about Christ long before His birth. It definitely appears to be more than coincidences. In some ways, it feels comforting to know that He knows and guides our lives if we invite Him in.
jpurdy@ohiochristian.eduParticipantMarcena,
Thanks for sharing this great information including the URL.
Yes, there should be SOPs (Standard Operating Procedures) that departments and employees know their roles and responsibilities as incidents occur. There should be on-going training on those procedures so that people remember them even when they are feeling the pressure of an incident or vulnerability. There should also be an outline of the separation of duties, acceptable use policies, and aawreness by users. There could also be target goals to get systems back online or back up strategies for server failures.
jpurdy@ohiochristian.eduParticipantYes, third party audits can be a valuable way to get feedback from an outside, unbiased source. As auditors, they often see many different ways of running businesses and can be a valuable resource to identify potential issues as well as potential ways to be more efficient. In security terms, external audits have the potential to identify potential weak areas before breaches or big issues can occur.
jpurdy@ohiochristian.eduParticipantWelcome to the course!
How do you like the book, “The Women of the Bible Speak”?
-
AuthorPosts