Presentation Title
Abstract
Based on this study, there is a wide range of techniques that people can use to breach data maliciously. Results from this study indicates that every individual surveyed was worried about potential security risks in their company, independent of the size and scope of the business. Involved in the survey the is the use of techniques and tips to help prevent such breaches from even happening. A significant response from the survey was "keeping up with infosec and maintaining up-to-date versions of tools and platforms." Results indicate that there was at least one layer of security used; with only one response 21 without any security. There were three responses with two layers, and seven responses with two or more layers of security.
College
College of Science & Engineering
Department
Computer Science
Location
Kryzsko Commons Ballroom, Winona, Minnesota
Start Date
4-20-2022 9:00 AM
End Date
4-20-2022 10:00 AM
Presentation Type
Poster Presentation
Session
1a=9am-10am
Poster Number
35
Included in
Approaches of Data Security by Businesses
Kryzsko Commons Ballroom, Winona, Minnesota
Based on this study, there is a wide range of techniques that people can use to breach data maliciously. Results from this study indicates that every individual surveyed was worried about potential security risks in their company, independent of the size and scope of the business. Involved in the survey the is the use of techniques and tips to help prevent such breaches from even happening. A significant response from the survey was "keeping up with infosec and maintaining up-to-date versions of tools and platforms." Results indicate that there was at least one layer of security used; with only one response 21 without any security. There were three responses with two layers, and seven responses with two or more layers of security.