Part 2 Flashcards
Many business professionals want ____ to data from anywhere they work, on a variety of ____
access, devices
Data ____ from Anywhere
Accessible
To be ____, employees now request ____ to data and contact information on their laptops, desktops, home computers, and ____ devices
productive
access
mobile
Therefore, IT departments must now provide the ability to ____ data with numerous ____
sync, devices
And if the IT department can’t or won’t provide this ____, employees now have the power to ____
capability, take matters into their own hands.
______ can be accessed from both the home and office or anywhere there is an Internet connection.
online storage sites
Though it might be possible to block access to some of these sites, it is ____
not possible to block access to them all.
This ability to easily transfer data ____makes securing an organization’s data that much more difficult.
outside the control of a company
Security Isn’t About _____
Hardware and Software
Many businesses believe that if they purchase enough ____, they can create a ____
equipment, secure infrastructure.
Firewalls, intrusion detection systems, antivirus programs, and two-factor authentication products are just some of the tools available to assist in protecting a network and its data. It is important to keep in mind that_____
no product or combination of products will create a secure organiza- tion by itself.
Security is a ____; there is no tool that you can “____.”
process, set and forget
All security products are only ____
as secure as the people who configure and maintain them.
The employees tasked with maintaining the security devices should be provided with enough time, ____, and equip- ment to properly support the products.
training
The Bad Guys Are Very ____
Sophisticated