So let’s say that I was a IT Supervisor of a small time corporation: What kind of issues would I face on a daily basis over the internet?
An example I can give would be Phishing scams, while not typically harmful if a scam acquired information on an IT specialist it could harm the entire buisness and even put alot of information on us out there where competitors can acquire it.
Another example would be ransomware yet again a tool people use to acquire information over the web and hold it hostage until a sum of money has been paid to recover said information otherwise it gets leaked globally for millions to view and even copy.
With a high turnover rate and even lower morale IT jobs are some of the highest security jobs out there managing daily scheduling and maintenance tasks to keep the work flow at an appropriate pace.
IT Supervisors are also responsible for managing the day to day security checks and personal tasks of other individuals this can some times mean that even the most important tasks can get overlooked leading to security breaches if not properly managed. Some of the tools we have at our disposal are Microsoft Project, Jira, Asana, Google Workspace, These tools help micromanage the daily tasks and drive performance.
ITSM is a service tool we use to track and handle daily incidents while secure firewalls and intrusion detection softwares are put into place to allow peace of mind while in the workplace that the system is safe and no data breaches occur.
In my company I would make sure the day to day had proper security protocols and firewall protections in place through incorporating the usage of google applications and outlook for a more outdated communications team while security would have tools like Incryption software, Malware Detection, CyberSecurity Monitoring, these tools would drive home the safety of my company while I get peace of mind that not only my staff but I myself am safe while browsing the web from my office. Virtual Private Networks are a great tool to secure data from prying eyes offering a further secure server from any data breaches that may occur.
For a company to prosper the proper precautions must be trained and taught at a base level so everyone knows what to expect when it comes to phishing scams, and malware installations so prioritizing the training of my employees to look out for suspicious activity and scanning bad actors in the workplace is a must from the day to day challenges we may face while in the workplace. Sometime Badactors are suspicious individuals with intent to break into secure servers to acquire data that fills their pockets these people can be identified via long periods of screen time in isolated portions of the building so identifying these individuals through secure channels is a great ground base excercise to help employees understand the risk these individuals pose to the company and the workplace. While my company may offer open office hours to guests long periods of prolonged use of devices should be asked to leave the premises for security reasons.