Information technology, business, cloud connectivity, cyber threat, private network, intelligence community, FINRA Financial Industry Regulatory Authority
The world today is in a major transition today, as we are continuously evolving. The Information technology is growing at a much higher rate than it was a few decades ago. Its incorporation into the business landscape has facilitated most of the companies going globally. There has been growth and increase in cloud connectivity, with most companies connecting to dozens of cloud services and data across the globe. As a result, cyber threats have become more viral, diverse and interconnected than they have been ever before. In some cases the attack aims at intrusion into private networks in order to access the sensitive information that is diplomatic economic or military in nature. The destruction after the attacks is imperceptible, dormant, and progressive (Cordesman, 2002). The business environment is now compelled to have an intelligence community in order to promote collaboration among the various experts in that field. It is important to face the challenge, since the trend in cyberspace and the response that the actors make will influence the business course in the near future.
[...] One of the policies is to establish the roles of the security roles and their responsibility. The policy enhances the separation of tasks regarding the information that has been stored. The Role Based Access Controls (RBAC) is a tool designed to govern the roles assigned to an individual and the constraint that are associated. Depending on the nature of the business, it is practical to make a separation of the people involved in certain type of data. For a business handling large volume of information from their customers, it will be prudent to appoint a chief steward in order to enhance the privacy of customer's information. [...]
[...] When using the emails to register or receive notices from social media there should be, a clear guideline followed for accepting such information. In addition, very strong password for the social networking is mandatory to enhance authentication of the user. These efforts will shield the non-employee from accessing the company online data. It is worthy for the company to set some time for educating their workers of the risks that is involved in social networking to make them cautious of what they disclose about the company online. The management policy should identify the potential reputation risks. [...]
[...] Most people are tricked to install fake antivirus that are freely offered (Willard, 2007).They end up providing remote control of their devices to the attackers who steals financial information or any other secrets they are interest them. The company should warn their employees of installing such free computer software. Online fraud protection is helpful in maintaining an online messaging that is predictable and consistent. Personal information request should never be through social networks, emails or any other online messages to make sure of the security. Direct contact should be encouraged if such information needs transfer. Protection against phishing is important to enhance the security of the company. [...]
[...] The government should confront the problem, create a framework for assessing the risk, and prioritize protection. A threat model can help to categorize the risk in a way that is easier to encounter them. The guidelines adopted in the strategy should indicate what is vital to be protected at a higher standard. A response plan should be structured and review of the accepted risk should be done continually. The strategy should establish a clear security baseline. Some security approaches such as the National Institute of Standard and Technology can be helpful to mitigate the risk. [...]
[...] The focus should be to give information on the new threats and not the already known issues. Companies can also conduct work force training as a strategy to counter cyber threats. Developing cyber, secured workforce will boost the risk management. In conclusion, cyber threats have become more viral, diverse and interconnected than they have been ever before. They are offensive operations intended to manipulate delete or disrupt data. In the world of development, the business sector now faces new and unpredictable cyber threats. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee