Verified Document

Computer Security For Small Businesses Essay

Information Technology Security for Small Business The need for protecting a business's information is crucial in the modern business world regardless of the size of the business. In light of the increased technological advancements that generate numerous threats and vulnerabilities, protecting a business's information is as significant as safeguarding every other asset. Actually, businesses are facing the need to protect information in a similar manner like safeguarding employees, property, and products. Generally, business information is valuable and at risk, which contributes to the need for information security. While small businesses may not have as much information need as large businesses, the need to protect such information is vital for these businesses. This process requires understanding the business need, identification of potential threats and vulnerabilities, and developing appropriate measures and controls to ensure protection.

Business Need for Information Security:

As previously mentioned, small businesses need to make Information Technology security a major priority as a means for protecting these businesses. The business need for information security is fueled by the fact that these businesses make security decisions on a daily basis. Some of the most common security decisions made by these businesses include locking their doors, fitting alarm systems, and ensuring that trustworthy employees work behind their counters (Porter, 2009).

The second factor demonstrating the business need for information security is likelihood of these businesses to lose their entire businesses if they lack effective protection measures. When a small business is careless about information technology security, it is likely to lose the entire business because of the impact on the company's reputation. In essence, small businesses are usually open for business as they want customers to come in and make purchases. If these businesses are careless about safeguarding their information, they damage their reputation and lessen the number of new and...

This in turn contributes to loss of profits, which contributes to significant implications on the business operations. In some cases, these businesses face lawsuits if such carelessness contributes to loss of a customer's personal information. Therefore, ensuring IT security enables small businesses to protect themselves against loss of profit, enhance their reputation, and lessen the costs of litigation.
Information Security Threats and Vulnerabilities:

Even though technological developments have numerous advantages for individuals and businesses, the cyberspace is increasingly becoming a dangerous place to be because of the ever increasing information security threats and vulnerabilities. Similar to large businesses, small businesses are facing the need to pay more attention to the dangers of cyber crime in order to avoid dangers brought by carelessness. While small business owners are experts in their respective business areas, they have minimal knowledge about computers, software, and networks. There is a wide range of information security threats and vulnerabilities that are carried out by cyber criminals.

These threats and vulnerabilities can be classified into two i.e. external and internal threats. The external threats are carried out by cyber criminals and information warriors, hackers, hacktivists, and experimenters and vandals (Porter, 2009). Since they are amateurs, experimenters and vandals carry out their activities to make a reputation for themselves or for the thrill. On the contrary, hacktivists are driven by personal or political agenda while cyber criminals are driven by financial gain. In contrast, internal threats and vulnerabilities come from within the organization and account for 80% of information security problems experienced by small businesses. Similar to the external threats, the target of internal threats is to access an organization's systems and information.

According to Popa (2013), the most commonly overlooked threats and vulnerabilities for small businesses include malware…

Sources used in this document:
References:

Hutchings, A. (2012, February). Computer Security Threats Faced by Small Businesses in Australia. Retrieved from Australian Institute of Criminology website: http://www.aic.gov.au/publications/current%20series/tandi/421-440/tandi433.html

Kissel, R. (2009, October). Small Business Information Security: The Fundamentals. National Institute of Standards and Technology, U.S. Department of Commerce.

Popa, C. (2013, April 1). Ten Most Overlooked Security Threats for Small Business. Retrieved June 20, 2014, from http://www.theglobeandmail.com/report-on-business/small-business/sb-tools/ten-most-overlooked-security-threats-for-small-businesses/article593438/

Porter, J. (2009, August 11). Descriptive Text for the Visually Impaired. National Institute of Standards and Technology, U.S. Department of Commerce.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Overview Businesses Today Are
Words: 3366 Length: 13 Document Type: Research Paper

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Network and Computer Security
Words: 1914 Length: 6 Document Type: Essay

Computer and Network Security Description of Information Environment of my Workplace My workplace is Verizon Communication and I have been working for the company for more than 5 years. The Verizon Communication major business is to provide communication solutions for businesses and individuals through the wired and wireless communication devices. The company provides complete communication systems and devices for individual, small business, medium business and enterprises. However, the company sells bulk of

Managerial Impact on Small Businesses
Words: 16627 Length: 55 Document Type: Term Paper

This is because this thesis has some limitations that should be observed when taking into consideration the importance of the thesis and its assistance. This thesis has concentrated on a subject that has been an extremely large and leading one, that is, the managerial impact on small businesses and the underlying reasons being reluctance shown by small business managers to make use of information technology and Internet. Undoubtedly, this

Barriers That Prevent Implementation of IoT Within Small Businesses...
Words: 5252 Length: 18 Document Type: Case Study

Executive Summary The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations

Computer Network for Bistro Bookstore Computer Network
Words: 1357 Length: 5 Document Type: Essay

Computer Network for Bistro Bookstore Computer Network Planning for Bistro Bookstore Launching a new bistro and bookstore is going to require three specific tasks be completed to ensure the stability, security and continued reliability of the network which over time will become the backbone of the information system and infrastructure of the store. These three tasks include the development of the new network, defining and implementing best practices and procedures for ensuring

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now