IT risk management relies on end-user and administrative compliance with the rules, regulations, and polices set up as a means of protecting information assets within the environment. Comprehension of the consequences and rewards of policy adherence is necessary if security professionals are expected to implement security, and risk management strategies that rely on the strength of policy management and distribution.
In a 750- to 1,250-word paper, evaluate the implications of Internet use (including, but not limited to, basic web presence, online shopping, vendor unique portals, vendor specific portals, “IOT,” social media, and/or VPN use) within a SMB, as well as data protection for intellectual property. Make sure to address third-party vendors, cloud technology, and technology trends.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.