0% found this document useful (0 votes)
52 views

Lab 06

Lucas plans to start a small BPO company operating out of his renovated garage. He is concerned with ensuring a reliable and secure network architecture and internet connection. The assistant provides an 8-item plan focused on preventing internet and network failures, which includes recommendations to use a reliable local internet provider, invest in cloud storage, use strong data encryption and security software, regularly review data logs, have a backup generator, frequently update email security, and maintain separate email accounts for advertising. The plan aims to secure Lucas' network and data for the next few years within his budget.

Uploaded by

Kamote Que
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Lab 06

Lucas plans to start a small BPO company operating out of his renovated garage. He is concerned with ensuring a reliable and secure network architecture and internet connection. The assistant provides an 8-item plan focused on preventing internet and network failures, which includes recommendations to use a reliable local internet provider, invest in cloud storage, use strong data encryption and security software, regularly review data logs, have a backup generator, frequently update email security, and maintain separate email accounts for advertising. The plan aims to secure Lucas' network and data for the next few years within his budget.

Uploaded by

Kamote Que
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Scenario:

Lucas plans to start a small BPO company in their newly renovated garage. He has
processed the required business licenses and the initial hiring process. Currently, his
biggest concerns lie in the network architecture and internet cabling. His budget is not
much of a problem. Still, he wants to ensure that everything from the devices and
network security to the professionals involved is sufficient to last and not encounter
problems for the next few years.

Provide a viable 8-item plan centered on internet and network


failure prevention:
1. Use a popular and reliable internet in your area.
Using popular and reliable internet in your area will lessen the chance to internet cutting
and internet loss as they will likely to continue their good services. Usually, it cost
around 2000 PHP per month in the Philippines.

2. Buy an online cloud storage in a trusted seller.


Buying an on online cloud storage is necessary so that you have a secondary storage is
good so that when the hard drives of computer collapse, you have a backup for the
information. Usually, it cost around 89 PHP per month.

3. Use WPA3 for transferring and receiving data.


Using WPA3 for transferring and receiving data will prevent data hacking by dispersing
the information if someone tries to stole it while in the process of sending or receiving.
Usually, this WPA3 is on a package while buying high-end to mid-end devices.

4. Use antivirus or a strong security application.


Using antivirus or strong security application will prevent malware to infect your devices.
Those malwares will try to delete, steal, copy and corrupt your files. Therefore, antivirus
programs are necessary and usually pricey around 1400 PHP per month and can be
used for up to 3 devices.

5. Always check or review your data logs.


Checking your data logs can be pain but this method prevents unwanted loss and
unwanted hackers at bay. It usually not cost something but if you hire someone to read
or review it then it will cost a little to none.
6. Invest for a secondary energy generator.
Using another source of energy to prevent data loss in sudden electrical shortage. This
will cost a lot as generators are quite expensive and to power it up you need gasoline or
diesel that is also pricey.

7. Updates the email security once a week or every three days.


Updating security like changing password to your emails prevents hacking that emails
which you use for your business. It will also, helps you if you click on any suspicious
sites and prevent them for using your emails. This will not cost anything but time.

8. Use different emails for posting on medias about your ads.


Using different emails for posting you ads or video and photos on media planforms will
prevent someone for spamming on your business emails. It will also allow you to know
what platform has or have a hacker/spammer on it.

You might also like