Dalton, Walton, & Carlton, Inc is currently facing a lot of problems in maintain its information in their computer systems due to incidences of insecurity. A few years back the company lost some of its computers that contained crucial company information through theft. Dalton, Walton, & Carlton, Inc management seems not to take the issue of data security seriously since they allow access of all company information to its staff anywhere. The present business environment is facing stiff competition and leakage of a company’s information to the rivals’ acts as a weapon to outdo the affected company. In addition, companies with weak remote authentication systems face incidences of web insecurity since internet hackers easily access their information (Bosworth, 2009). According to Anderson (2008; 41), an organization should have a strong remote authentication strategy that offers an effective defense tool in order to secure data and private information.
Dalton, Walton, & Carlton, Inc IT infrastructure consists of Microsoft server and personal computers (PCs). The company manages their website using a main web server that controls other servers that are accessible to the company staff. The main problem facing the company’s data and information security is that outside vendors are allowed access to the systems without authorization. This places the company in many risks of losing its private information to the outside or evil parties. Dalton, Walton, & Carlton, Inc carries out design work meaning that leakage of info ration to the outside world would cost the organization a lot as some people might steal their designs, or change them. On the other hand, protection of the company’s intellectual property is rendered weak because they have no perfect way of retracing their stolen designs since they are not password protected.
On the other hand, lack secure access to the company networks exposes it to possible thefts and corporate frauds that lead to loss of sensitive data.
Due to consumer demands and pressure in complying with the prevailing situations organizations look for new ways of strengthening their authentication techniques, internal control, and identification management (SafeNet, 2009; 6-7). Dalton, Walton, & Carlton, Inc allowed vendors access to their systems without considering the possible outcomes and dangers associated with sharing the main server password. Moreover, Dalton, Walton, & Carlton, Inc have third party companies who make use of their servers in various operations. Organizations use internet-enabled authentication programs that enable their employees’ access to the information using the company’s computers. The company trusted its employees to the extent that the management allowed free access to all network security systems. Some employees left the company and joined the rival company indicating that they had stolen crucial information from Dalton, Walton, & Carlton, Inc.
Dalton, Walton, & Carlton, Inc should come up with an authentication process that allows only access to company computers within the compound in order to reduce instances of data leakages. In addition, the company’s network servers are password protected, but all the employees can access these computers making it easier for them to get away with some desktop and laptop computers. In addition, the company lacked fraud detection software that has the capability of sensing any unwanted authentication to the system and block the user immediately. According to Symantec Corporation (2011), various systems are available that most companies use in preventing access of unwanted parties to their network servers. Security authentication systems allow organizations to maintain high security standards through controlled remote authentication.
Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems, (2nd ed). (pp. 811-910) New York: John Wiley & Sons Publishing, Inc.
Bosworth, S. (2009). Computer security handbook (5 ed). Vol. 2; 2-3. New Jersey: John Wiley and Sons.
SafeNet. (2009). Strong Authentication: Securing identities and Enabling Business. pp. 6-7.
Retrieved from: inc.com/uploadedFiles/About_SafeNet/Resource_Library/Resource_Items/White_Papers_-_SFDC_Protected_EDP/DownloadAsset(6).pdf
Symantec Corporation. (2011). 5 Essential Steps for Implementing Strong Authentication in the Enterprise. Retrieved from: