Future+developments+for+N&Q

__**Future developments within N&Q Investments**__

- **Personal Networks** N&Q may also wish to have a firewall on their network which filters information between a private network and the whole internet. Hardware firewall products can be purchased and connected to the internet line of the company’s network to guard against any unauthorized access to its network, only enabling access to those who pass security inspections. However, employees would of course still need to communicate with the rest of the internet, which is why encrypting a message by scrambling transmissions can make this communication secure. A special encryption key encrypts the message which only a matching key can de-code. This enable information leaving and entering the network private and more secure, making it harder for intruders to obtain any of the company’s private information, maintaining data integrity. 1267856977
 * Reliability
 * High Security  -->When it comes to the internet and networks, vulnerability to network intrusion, viruses and how to authenticate information are questioned. Network intrusion may lead to the threat of compromising data integrity. N&Q would need to find a way to authenticate information that wishes to access its network to make sure it is trustworthy and from a reliable source before accepting it. An example of a virus is the “Worm.ExploreZip” that contains malicious payload. It multiplies by sending itself out to Microsoft Outlook email contacts and destroys files. In 2000, hackers entered the database, stole large amounts of money and credit card numbers and held them for ransom. As N&Q are concerned about events similar to these happening to them, as the internet line may not be reliable or safe from hackers, N&Q could find a way to make their network safe from intrusion. The simplest way to set restrictions to their network is too create passwords and an identity login. N&Q’s network would require secret password information before an employee wishes to login to use the network, limiting the amount of access the network will have. This can be done by creating a network account for all employees. Every employee will have their own user name and password. A big benefit to using a password would be the ability to track what each employees does on the network to identify and suspicious behavior.

if you don't have a virus scanner your computer could get (and stay) infected with viruses. Viruses can do everything from delete your files, prevent your computer from starting, or more commonly, use your computer to send spam or more viruses. 1264482502 answer.com
 * Virus Protection

the reason why people have password productions,
 * Password Protection


 * Protection against hackers

- **Virtual Learning Environment** - **Tele – working** Other useful applications to look into are anti-spyware or anti-adware programs. Like anti-virus software, these programs search your computer for applications that can affect your network's security. __[|Spyware]__and adware can track your online activities and send information to another computer. Many of these programs have active scan modes that will help you keep an eye on your computer in real time. Others may require you to set up a scanning schedule or run a scan manually. It's a good idea to run scans on a regular basis -- at least once a week. [] 1267858542
 * Improve hardware and software
 * Education of employees
 * monitoring employees --> They would have to monitor employees to makes sure they are spending an appropriate amount of time working and not wasting it. Also, they may filter and set certain rules to prevent website to prevent employees to access inappropriate material. Recently, there has been an increase of employee monitoring as 78% of companies in the USA admit to watch employee activities over the company. Also, statistics show that the market for employee monitoring software has increased from 62$ million in 1991 to $214 million in 2001 and has probably increased even more today. This is to ensure employees are not using office hours to gamble online, visit pornography sites, engaged in illegal activity online or just wasting their time socially by chatting to friends. 70% of all web traffic to pornography sites happen during office hours .N&Q can purchase a special employee monitoring system which can store each employee’s browsing activity, chat conversations and file downloads. It can also detect any searches or purchases for illegal items and send alerts to the department in charge of monitoring. Also, instant live monitoring can be included where an employee’s actions and keystrokes show up on the employer’s computer. Performance can be determined by the number of keystrokes per hour, thus the system can alert the employee if any of the staff is performing below standard number expected. Some programs also include special features such as detecting employee behavior and sending alerts if detected to wasting time or breaking company policy. 1267856977
 * Improved Hardware and Software
 * Improved connectivity
 * Back-ups
 * Private accounts on home computer
 * Including other devices (e.g. mobiles)
 * If you use a wireless router, you should make sure you set a password and enable __[|encryption]__. Unprotected wireless networks are a bad idea. Most routers have either Wireless Encryption (WEP) or Wi-Fi Protected Access (WPA) encryption options. Some have both. WPA is more secure than WEP. Enabling encryption and choosing a strong router administrator password are two steps that will help keep your network secure.  Anti-virus software isolates and neutralizes malware. Most anti-virus software searches for viruses by comparing the applications on your computer against a huge database of malware. If something matches, the software alerts the user and attempts to neutralize the program. For anti-virus software to remain effective, it's important that you keep it up to date. Many programs have an auto-update feature that will download new virus definitions on a weekly basis.

[] In recent years, software and operating system upgrades have become more streamlined, and today, employees using different versions of products can continue to collaborate effectively. For example, if the majority of employees in an organization use an old version of Windows, and an employee with a develops a disability that requires the use of a screen reader that works best on the most recent version of Windows, that employee can be upgraded to the latest version of Windows and still effectively work with his coworkers. Or, if an employee simply needs to change his or her font settings and sound options, Windows provides these accessibility options. 1267848169
 * - System Compatibility**
 * Similar Software and Hardware
 * Standard format for documents

[] :The online survey reports that most employees are unfamiliar with such basic search techniques as synonym finder, site search, or even how to limit by timeframe or file type. As a result, Google business research queries either fail to provide the desired results or waste valuable employee time by burying key information. Boost eLearning has released a new course, Boost eLearning Google Search Training Quick Lessons, that focuses exclusively on these and other key business research techniques, saving companies valuable employee time and materially improving search results. Google is an extremely powerful business research tool, but employees that lack basic instruction on its use are both losing time and missing opportunities, which could far exceed the value of the lost hours. 1267848169
 * - Improving IT skills**
 * Education of employees