Computing resources are the tools that enable problem-solving and solution creation using the data received and stored. Knowing this, it’s also important to be aware of what computing resource uses are prohibited such as, distributing licensed or copyrighted material online. Copyright violators can be sued and have to pay the damage fees to the owner, additionally imprisonment could be a penalty to the violator. Other punishable acts include using the computer to access another person’s information, interfering with others' use of computing resources, and disguising your information and identity in any way. Some specific ways that retain prohibited activities using computing resources in college according to Western Piedmont Community College is sending inappropriate emails under the college’s address, using the college computing resource for commercial purposes without permission, or interfering with campus computing resources in any way.
Data misuse is when regulations, laws, and requirements are violated, resulting in information being used for something it was not intended for. An example of this took place in 2015, when one of Morgan Stanley’s financial advisors downloaded account data of one of their firm’s wealth management client and proceeded to upload a large number of account details online. Not only are data breaches costly to companies, but it’s also incredibly damaging to their reputation. An abundance of time, energy, and money is required to clean up the aftermath of data breaches, especially with big companies, on average the cost of a data breach is $4.88 million. Seeing as 95% of data breaches are financially motivated, it’s crucial to prioritize preventing data misuse and breaches.
The best way to protect your company is by knowing the proper practices to implement and protect your systems from any and all potential exploitation. Administering identity and access management through multi-factor authentication helps ensure only chosen personnel have access to sensitive data. In addition to technical solutions, you can also better educate workers and teams and set up behavior alerts to better guarantee data safety. By setting up behavior alerts, security will be alerted if any concerning actions take place, such as attempting to access restricted files, running prohibited applications, or a new login to the server. And lastly, talking to your teams, this means keeping them up to date and aware of data security, properly educating them on the consequences, why it’s so important, and even reviewing the company’s policies regarding data misuse from time to time.