Cybersecurity Issues for Business Travelers (preparing a position paper )
Please read the Instruction in details
you will “shadow” the head of Resort Operations (RO) at a Travel Security meeting attended by the company’s senior managers and executives. The focus of this meeting will be: Cybersecurity Issues for Business Travelers. The company is particularly concerned about potential identity theft and phishing attacks (including “spear-phishing” and “whaling”) that could allow hackers to steal login credentials and other information. One of the outcomes of this meeting will be recommendations for improvements and/or changes to the company’s guidance to employees, managers, and executives regarding use of laptops, cell phones, and other mobile devices to access company email and databases while traveling.
Resort Operations is involved in this meeting since the majority of employees who travel on company business work for RO. The head of RO, R. Rose Padgett (the owner of s first hotel, Robenias Guest Hous Padgett-Beale Corporate ), has asked you to review the Read Ahead package (see below) and then prepare a position paper for her use during this meeting. Since she, like other executives, is very busy, she has asked you to limit this paper to no more than 2 pages and 5 key points. She has also asked that you list and cite the resources used so that she can have a senior staffer who can fact check your work. (APA format citations are preferred.)
Note: a “position” paper is used by staff to inform an executive and assist in preparations for meetings with other executives. The position paper should be written in the third person and usually has three parts:
(a) statement of the issue(s) — clear and concise
(b) the position to be taken on the issues (intentions, beliefs, attitudes)
(c) recommendations that restate key points and provide suggested resolutions or actions.
Read Ahead Package(used also as resources too )
https://www.businessinsider.com/travel-tips-to-avoid-getting-hacked-overseas-2016-6
https://www.redzonetech.net/blog/13-mobile-device-security-tips-foreign-business-travelers-china/
The read-ahead package for this meeting includes the following resources:
1. https://www.dhs.gov/sites/default/files/publications/Cybersecurity%20While%20Traveling_7.pdf
2. http://www.businessinsider.com/travel-tips-to-avoid-getting-hacked-overseas-2016-6
3. http://www.redzonetech.net/blog/13-mobile-device-security-tips-foreign-business-travelers-china/
4. https://www.cnbc.com/2016/09/21/travelers-beware-that-free-charging-station-could-hack-your-phone.html
You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.
Latest completed orders:
# | topic title | discipline | academic level | pages | delivered |
---|---|---|---|---|---|
6
|
Writer's choice
|
Business
|
University
|
2
|
1 hour 32 min
|
7
|
Wise Approach to
|
Philosophy
|
College
|
2
|
2 hours 19 min
|
8
|
1980's and 1990
|
History
|
College
|
3
|
2 hours 20 min
|
9
|
pick the best topic
|
Finance
|
School
|
2
|
2 hours 27 min
|
10
|
finance for leisure
|
Finance
|
University
|
12
|
2 hours 36 min
|