Information Security Gap in Business Case Study

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Many customers are willing to provide their details to companies that have better privacy policies. This need explains why “there is a paradigm shift in the information security and assurance industry” (AG Series Case Study, 2015, para. 3). Many players in this industry are forced to identify new software applications that have the potential to improve the level of data security and privacy. The case of Nation Technologies shows how new systems are needed to improve the level of data security. The case study also highlights the gaps and challenges experienced by many companies. This essay describes the current gap experienced in information security. It also examines the case of Needham Bank in order to support the use of better security systems. Such systems should improve the level of privacy and support the inputs of many stakeholders.

The Current Gap in Information Security

The outstanding fact is that “many organizations are focusing on new systems that can increase reliability, accuracy, and timely access of information” (Deshmukh & Qureshi, 2011, p. 26). Information technology assets have become powerful processes that have the potential to support the needs of different companies. Deshmukh and Qureshi (2011) offer powerful ideas and concepts towards dealing with various information risks. Proper risk management approaches have been suggested in order to protect the data and information used by different organizations. The use of modern information technologies should be done in a professional manner in order to promote organizational growth. This will be achieved by tackling the major threats of modern information systems.

This situation explains why Stephen Nation’s firm created “an easy-to-use encryption key distribution service that would make it possible for different firms and users to exchange documents securely” (Agrawal, 2012, p. 1). The existing “public-key encryption in the market took two unique forms” (Agrawal, 2012, p. 2). These “two forms are VPN (secure the target) and TLS (secure the perimeter)” (Agrawal, 2012, p. 2). In TLS, sensitive data is usually encrypted before it is transmitted. The next process is usually known as decryption. Many retailers and banks have been using these forms in order to ensure their transactions are secure. However, these methods have been characterized by specific limitations. For instance, the delivered information is not encrypted, thus making it accessible to third party users. The technology does not have adequate auditing and tracking controls. The “technologies also limit the targeted information to the receiver and the sender” (Agrawal, 2012, p. 2).

Nation Technologies’ solution was aimed at addressing the above limitation. The introduction of BIOWRAP would be spectacular and profitable for many firms. The regulatory environment experienced in 2010 was appropriate for BIOWRAP’s success. Many consumers and agencies wanted companies to manage data in a professional manner. Companies in the financial and healthcare sectors are currently expected to focus on the best standards. The case study also shows clearly that a new market was emerging for Nation Technologies’ BIOWRAP. The “founder of the company decided to focus on specific industries such as healthcare, consumers, corporate data, and finance” (Agrawal, 2012, p. 6). Nation also designed a powerful model that would make the firm successful. The regulations existing in the market would “encourage more customers and businesses to look for appropriate security options” (Agrawal, 2012, p. 7). Many companies were also lacking appropriate processes, thus affecting their data handling strategies. The introduction of BIOWRAP would make it easier for such companies to achieve their business goals.

The vulnerability of credit cards also motivated the Nation to support his new technology. The “penalties associated with any kind of breach also motivated many firms to look upon favorable solutions such as BIOWRAP” (Agrawal, 2012, p. 7). Nation Technologies was also proud of the features and strengths of its new technology. The technology would make it possible for many companies to achieve their goals. As well, many security professionals believed strongly that there was a gap in modern information systems. This gap created a new opportunity for Nation Technologies.

The issues faced by Stephen Nation reflect the gaps and challenges that have been faced by many companies. The nation’s solution should, therefore, become the benchmark for future companies. For instance, business organizations should consider the weaknesses associated with traditional encryption techniques such as VPN (secure the target) and TLS (secure the perimeter). The limitations associated with this technology have made it possible for many hackers to access different data. This malpractice has, therefore, been associated with different costs and problems. Many companies have lost their credibility due to the loss of sensitive data. As well, such traditional technologies have made it impossible for companies to realize their potentials.

The Way Forward

The “current explosive growth in public-key encryption technologies supports the needs of many organizations” (Kim & Solomon, 2013, p. 37). However, many professionals have realized that different companies are unable to use their data and information in a productive manner. The “continued protection of different information systems has made it easier for hackers to access delicate data” (DesktopDirect, 2011, para. 5). This gap explains why Nation Technologies has introduced BIOWRAP. This new solution will have the potential to secure networks while at the same time safeguarding the data handled by different employees and users.

The decision to deploy the use of DesktopDirect has made it possible for Needham Bank to realize its potential. This new system is making it possible for different employees to promote their products. The system has also streamlined the firm’s operations while at the same time, increasing the level of performance (DesktopDirect, 2011). The current approach has eliminated different concerns, such as possible data leakage. DesktopDirect has also protected Needham Bank from unpredictable and disruptive events. Many employees are “currently able to use this powerful device of choice for both mobile and remote access” (Kim & Solomon, 2013, p. 76). DesktopDirect is, therefore, a powerful solution that borrows a lot from Nation Technologies’ BIOWRAP. This solution has made it possible for Needham Bank to focus on the best practices. The approach has also improved the firm’s productivity.

Conclusion

Many “companies and firms have been focusing on the best technologies to protect different systems that gather, communicate, store, display, process, and present data to different users” (Deshmukh & Qureshi, 2011, p. 26). However, the insecurities associated with sensitive data have led to new threats. This fact explains why many consumers and agencies have been on the frontline to support new practices that can result in privacy. That being the case, business organizations should use powerful solutions that have the potential to protect the data used by different employees and consumers. Such technological solutions will reduce the risks associated with hacking. As well, there is a need to use powerful systems that can improve the level of security and support the productivity of more employees. Needham Bank’s success explains how the proposed solutions can produce positive outcomes in different organizations.

Reference List

AG Series Case Study: Needham Bank. (2015). Web.

Agrawal, M. (2012). Nation Technologies. Journal of Information Technology Education, 1(10), 1-19.

Deshmukh, A., & Qureshi, R. (2011). Transparent Data Encryption: Solution for Security of Database Contents. International Journal of Advanced Computer Science and Applications, 2(3), 25-28.

DesktopDirect: Large-Scale Remote Access and Mobility. (2011). Web.

Kim, D., & Solomon, M. (2013). Fundamentals of Information Systems Security. Burlington, MA: Jones & Bartlett Learning.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, July 4). Information Security Gap in Business. https://ivypanda.com/essays/information-security-gap-in-business/

Work Cited

"Information Security Gap in Business." IvyPanda, 4 July 2020, ivypanda.com/essays/information-security-gap-in-business/.

References

IvyPanda. (2020) 'Information Security Gap in Business'. 4 July.

References

IvyPanda. 2020. "Information Security Gap in Business." July 4, 2020. https://ivypanda.com/essays/information-security-gap-in-business/.

1. IvyPanda. "Information Security Gap in Business." July 4, 2020. https://ivypanda.com/essays/information-security-gap-in-business/.


Bibliography


IvyPanda. "Information Security Gap in Business." July 4, 2020. https://ivypanda.com/essays/information-security-gap-in-business/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1