133
15
information technology
and Security
TRUETT GRAHAM RICKS
With the prevalence of computers in the workplace, and businesses
integrating more and more technical systems, dependence has been
created on computers and technical systems. is dependence makes
computers and technical systems an easy target for those looking to
gain access to a business’s data. With businesses storing the majority of
data on systems with access to the Internet, also meaning there is access
from the Internet to those systems, it is critical to do everything pos-
sible to protect that data. In recent times, data breaches such as those of
major retailers resulting in theft of the data of millions of individuals,
and even data breaches of government sources leaking data ...