Companies are producing massive amounts of data - data that is stored and transferred between computers and in-house servers or in a cloud service. Also, more and more working professionals carry sensitive information around in their pockets on their mobile devices. In fact, more mobile devices were purchased in 2011 than PCs. Whether physically or virtually, data is in motion more than ever before, which presents new challenges for businesses to keep private information secure.
Companies that rely on storing big data through cloud computing are more susceptible to data loss or system downtime. Surprisingly, many organizations have yet to implement security measures to protect data stored within social media channels, on mobile devices, or throughout cloud computing.
Are you up to speed on the vulnerabilities companies face? If you're interviewing for a Network Administrator or Software Developer position, or any professional IT position, your knowledge of today's cybersecurity threats and solutions is pivotal to getting hired.
Test your IT IQ below to find out if you're ready to defend and protect private data for your next employer.
1. Which of the following security measures are appropriate for protecting mobile devices?
- Implementing pass codes
- Encrypting data
- Installing remote data wiping capabilities
- All of the above
2. True or False: Malware attacks, such as computer viruses, spyware, and other malicious programs, are the most common culprit of information security breaches.
3. Which one of the following measures is most effective for keeping information storage devices secure at a place of business?
A. Storing backup data offsite
B. Installing an intrusion detection system
C. Using unique passwords on all devices
D. Shutting down all devices at the end of each business day
4. True or False: A standard Errors and Omissions insurance policy protects subscribers in case of a private data security breach.
5. What is the most effective measure for protecting mobile devices carried by employees for both business and personal use?
A. Restrict use to only phone calls
B. Power down devices when not in use
C. Educate employees on how to avoid behaviors that compromise their devices
D. All of the above
6. True or False: Human error is seldom to blame for security breakdowns.
- D. All of the above
- True, although while malware attacks outnumber other threats, hacking attacks are often more malicious.
- B. Installing an intrusion detection system
- False. Additional coverage must be obtained to insure protected data.
- C. Educate employees on how to avoid behaviors that compromise their devices
- False. Human error is more of a factor today than it was two years ago.
So, how did you do? Tally up your correct answers and find out where you fit in the scale below:
- Answered all 6 correctly: Congratulations! Your next employer will be lucky to have you!
- Answered 4-5 correctly: Not too bad, but you have some homework to do.
- Answered 1-3 correctly: What happened? Make sure IT is the right field for you.
- Answered 0 correctly: That device in your hand is called a mouse, but don't be afraid.
Cyber threats already exist, but as information technologies progress, data will become more vulnerable simply due to its sheer volume. Most business executives and IT experts believe the biggest threats have yet to come, so any company you work for will be counting on your ability to protect their big data. You can do your part to keep sensitive information secure through continuous education on cybersecurity issues and by remaining vigilant for newly identified threats.
If you're already an employed IT professional, what are some additional measures your IT department has taken to protect your company's private data? Please share your insights in the comments section.