Skip to content

Cyber Crime Protection and Global Business Travel

Student’s Name

Institutional Affiliation

                                    Cyber Crime Protection and Global Business Travel

To enforce the security of data and the company’s system, it is important for the traveling employees to follow a security procedure. The employees of the company will have be required to place a notice of travel at least one day before traveling with the company’s digital content and devices. All the devices will be configured for connectivity to a cloud server where all the content they will need will be uploaded. According to Buyya et al (2011), this will protect the company from the loss of data and content in case of a security breach on the journey. The employees will present the devices they will be carrying to the IT department for security evaluation and installation of extra security features.

Different security features will be installed depending on the countries employees will be visiting. This is because different countries pose different security threats (Brenner, 2010). While the hardware is the most risky in some countries, the software and content is risky in other countries. Most importantly, secure content and access details are especially the most risky, especially in countries with competitor companies (Spencer, 2013). Before leaving, employees will have to be cleared by the IT security team for risky content and devices carried. They will be provided with new login details to company’s content. According to Clough (2010), such a measure will allow monitoring of their login sessions for any irregular access. Moreover, employees will access any sensitive data and information from the cloud servers of the company.

One of the resources will be the travelling computers that are designed for employees on the move. The cloud server is the other resource the company that stores the most material information of the company. According to Buyya et al (2011), cloud computing will help the firm by allocating secure login details to the authorized employees. The reliance on the security measures will strengthen my ideas on the use of security devices and backing up information on the cloud computing platforms.
                                                            References

Brenner, S. (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara, CA: ABC-CLIO

Buyya, R., Broberg, J., & Goscinski, A (2011). Cloud Computing: Principles and Paradigms. New York, USA: Wiley Press

Clough, J. (2010). Principles of Cybercrime. Cambridge: Cambridge University Press

Spencer, T. (2013). Personal Security: A Guide for International Travelers. New Tork: CRC Press