July 09, 2014

Security continuum

As days pass by in research for the KBAM pma my knowledge was enhanced about Security Continuum. Security continuum is important for every company in the age of technology that we live in, as companies face cyber threats virtual and physical. Therefore the importance of having a robust security system is vital.

“It's long been said that the revolutions in communications and information technology have given birth to a virtual world. But make no mistake: This world -- cyberspace -- is a world that we depend on every single day. It's our hardware and our software, our desktops and laptops and cell phones and Blackberries that have become woven into every aspect of our lives…so cyberspace is real. And so are the risks that come with it…In short America's economic prosperity in the 21st century will depend on cyber security.”

-The President of the United States, Mr. Barack Obama, 29 May 2009

After company realize the importance of security continuum, they need to implement it for full proofing their knowledge that’s later converted from tacit to explicit. The importance of knowledge management is realized in companies but little is done to secure it. Noticing this vulnerability thieves both physically and the hackers of the cyber world take advantage and attack.

Therefore the implementation of security continuum is important but the continuous improvement via upgrading this system is considered to e more necessary. The aim is to lead the company to excellence and there is no way better to that than monitoring the systems implemented and critically analyzing when and what to upgrade. Suggested ISO certifications like ISO 17799 are useful to comply with the international standard to prevent any kind of security flaw.

- No comments Not publicly viewable

Add a comment

You are not allowed to comment on this entry as it has restricted commenting permissions.

July 2014

Mo Tu We Th Fr Sa Su
Jun |  Today  |
   1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31         

Search this blog



Blog archive

Not signed in
Sign in

Powered by BlogBuilder