Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Introduction
In the context of present-day developments, a business cannot achieve high results without IT and digital technologies. If enterprises do not implement the recent innovations in the field, it will lead to inefficiency and economic impracticality (Rainer & Prince, 2019). Therefore, the modern business environment is dependent on IT technologies, and, consequently, it is extremely vulnerable to various cyber threats (Rainer & Prince, 2019). Therefore, the purpose of this paper is to cover the types of possible threats and mitigation methods, explain the importance of a continuity plan, and outline ethical and privacy concerns for organizations.
Types of Threats and the Ways of Mitigation
There are numerous types of cyberthreats, and the number of different options is increasing rapidly. All of them may be separated in unintentional and deliberate, and threats may be released by various methods (Bellanova & González Fuster, 2019). First of all, hackers may stick to the approach of social engineering, which implies posing a threat via the employees of an organization (Bellanova & González Fuster, 2019). For instance, it has become a common sight for people to receive a phone call from a bank employee who asks the client to confirm a monetary transaction. In case people reveal their personal and private data, they are despoiled. In order to provide security in these situations, it is essential to inform the customers of the correct behavior in case of phone calls from the bank. Furthermore, businesses implement additional checks of identification for monetary transactions.
Another widely spread method is brute force, which is applied whether an enterprise has a security system of high quality, as it is extremely difficult to reach the data via other means. Using special software, malefactors successively attempt to guess the password by applying all the possible options (Bellanova & González Fuster, 2019). The only effective way of mitigating this threat implies the constant renewal of access codes and passwords. In addition, a sufficient solution could be the implementation of programs that monitor the attempts to enter the system and the time when they were made.
Moreover, these days, software viruses appear to be a popular form of cyber attack. The example of these viruses are cbf, chip dale, just, foxmail inbox com, watnik91 aol com (Bellanova & González Fuster, 2019). They codify data, which is stored in photographs, appliances, electronic tables, and files (Bellanova & González Fuster, 2019). Companies, which have encountered such threats, are offered to return the data in exchange for a significant sum of money. Frequently, malefactors ask to give the sum for the information in bitcoins. However, it is a common sight that organizations are not capable of interpreting the figures after paying the attackers. In order to protect a business from these situations, it is essential to adhere to data backup, implementation of appropriate anti-virus software, and renewal it on a regular basis. Furthermore, it is highly recommended to supply the employees with necessary information on digital security.
The Continuity Plan
A continuity plan for business implies performing essential protective functions and measures which prevent data from various cyberthreats. Therefore, the primary consideration for this approach involves preparedness for disastrous situations (Phillips, R. & Tanner, 2019). In case an organization is capable of responding to the emergency rapidly and correctly, the negative consequences may be minimized or avoided (Phillips, R. & Tanner, 2019). The continuity plan should include necessary practical steps in case of cyber threats, which lead to the reconstruction of the operation of a company (Phillips, R. & Tanner, 2019). For this reason, the significance of continuity planning in the context of cybersecurity should not be underestimated.
Ethical and Privacy Concerns for an Organization
Today, organizations may store a significant amount of data about their clients. Therefore, in case the information is stolen, some personal figures may be revealed without the willingness of a customer, which presents an ethical concern (Phillips, R. & Tanner, 2019). In addition, the stolen data may be used in a way that is harmful to a person. An illustrative example could be the case of a phone call from a bank, which has been described earlier. Furthermore, organizations may own private information, which customers resent sharing. For instance, hotels may store information about a client’s transportation, leisure time activities, and location. In case the guest is a famous person, the publication of these figures may violate his or her life for privacy. Therefore, cyber-attacks may pose ethical and private concerns for the customers of an organization.
Conclusion
Today, business and digital technologies are closely connected, and it is impossible to respond to the customers’ needs without their implementation. Although modern innovations are associated with considerable advantages, which improve the operation of a business, there are serious drawbacks. Namely, the business environment appears to be extremely vulnerable to cyberattacks, which are dangerous for their negative consequences in numerous aspects. It may have a significant impact on clients’ well-being and the operation of enterprises. For this reason, in the context of present-day developments, the importance of preventative measures and awareness of cybersecurity should not be underestimated.
References
Bellanova, R. & González Fuster, G. (2019). Composting and computing: On digital security compositions. European Journal of International Security, 4(3), 345-365. doi:10.1017/eis.2019.18
Phillips, R. & Tanner, B. (2019). Breaking down silos between business continuity and cyber security. Journal of Business Continuity & Emergency Planning, 12(3), 224-232.
Rainer, R. K. & Prince, B. (2019). Introduction to information systems, 8th edition. Wiley.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.