WhatsApp Number: +1(249) 265-0080
Intranet Security Practices
Read the following article about the impact of intranets on building a sense of community in the workplace: The Establishment of a Frame Agreement for the Provision of Digital Workplace
Companies use and continue to develop internal intranet systems to manage their sociotechnical applications. The intranet applications are designed to support the human–computer interaction (HCI) process, but they are typically proprietary to company employees.
Given the ongoing expansion of these sociotechnical applications, conduct substantive research on these applications and respond to the following questions:
- What are some examples of the consequences of outsiders gaining access to intranet data and proprietary information?
- What are some steps that employees can take to protect a company’s intranet data and proprietary information from outsiders?
- What types of company information should employees not share with one another and why?
- What should companies do to ensure that employees maintain professionalism and etiquette when using intranet and collaboration applications?
Include a minimum of 3 references and corresponding citations in your Individual Project each week.
Check our essay writing services here
Intranet Security Practices
Title: Protecting the Digital Workplace: Intranet Security, Confidentiality, and Professional Conduct
As companies increasingly rely on intranet systems and digital workplace platforms to manage sociotechnical applications, the need for robust information security and employee professionalism becomes critical. Intranets are private, internal networks that facilitate communication, collaboration, and access to company resources. However, improper use or security lapses can lead to significant consequences.
1. Consequences of Outsiders Gaining Access to Intranet Data
Unauthorized access to company intranet systems can have serious legal, financial, and reputational implications. For example:
-
Data Breaches: Outsiders may gain access to sensitive HR data, client information, financial records, or intellectual property, which could be leaked or sold (Disterer, 2013).
-
Competitive Disadvantage: Competitors could exploit proprietary strategies or product designs, undermining innovation and market position.
-
Legal Liability: Regulatory violations (e.g., GDPR or HIPAA) resulting from leaked data can lead to heavy fines and lawsuits.
One well-known case is the Sony Pictures hack in 2014, where hackers accessed confidential emails and scripts via internal networks, causing massive disruption and public embarrassment (Perlroth, 2014).
2. Steps Employees Can Take to Protect Intranet Data
Employees play a crucial role in protecting intranet systems. Best practices include:
-
Using Strong Passwords and multi-factor authentication (MFA).
-
Avoiding Phishing Traps by not clicking suspicious links or opening unknown attachments.
-
Regularly Updating Software and reporting anomalies to IT departments.
-
Logging Out of Sessions when not in use and avoiding public Wi-Fi when accessing intranet remotely.
Training programs in cybersecurity hygiene help cultivate a culture of vigilance among employees (Von Solms & Van Niekerk, 2013).
3. Types of Information Employees Should Not Share Internally
Not all information is appropriate for internal circulation. Examples include:
-
Personal Employee Data: Sharing performance reviews, health details, or disciplinary records may breach privacy laws and create workplace tension.
-
Legal or Pending Contracts: Circulating confidential business or legal documents can compromise negotiations or contracts.
-
Unverified Information or Rumors: These can lead to misinformation, panic, or reputational damage internally.
Limiting access to sensitive information on a need-to-know basis upholds data integrity and organizational confidentiality.
4. Promoting Professionalism and Etiquette on Intranet Platforms
To ensure proper behavior and usage, companies should:
-
Establish a Digital Code of Conduct, covering respectful communication, harassment policies, and professional tone.
-
Monitor Usage and Enforce Accountability, including audit logs and disciplinary policies for misuse.
-
Train Employees on etiquette when using chat, email, or collaborative tools like Microsoft Teams or Slack.
-
Designate Moderators or Admins to oversee group forums and communication channels.
When employees maintain professionalism in digital communication, they foster a respectful, productive environment that aligns with organizational culture and values.
References
-
Disterer, G. (2013). ISO/IEC 27000, 27001 and 27002 for information security management. Journal of Information Security, 4(2), 92–100. https://doi.org/10.4236/jis.2013.42011
-
Perlroth, N. (2014, December 17). Sony cyberattack, first a nuisance, swiftly grew into a firestorm. The New York Times. https://www.nytimes.com/2014/12/31/technology/sony-attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html
-
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004