Computer Security For Small Businesses Essay

Information Technology Security for Small Business The need for protecting a business's information is crucial in the modern business world regardless of the size of the business. In light of the increased technological advancements that generate numerous threats and vulnerabilities, protecting a business's information is as significant as safeguarding every other asset. Actually, businesses are facing the need to protect information in a similar manner like safeguarding employees, property, and products. Generally, business information is valuable and at risk, which contributes to the need for information security. While small businesses may not have as much information need as large businesses, the need to protect such information is vital for these businesses. This process requires understanding the business need, identification of potential threats and vulnerabilities, and developing appropriate measures and controls to ensure protection.

Business Need for Information Security:

As previously mentioned, small businesses need to make Information Technology security a major priority as a means for protecting these businesses. The business need for information security is fueled by the fact that these businesses make security decisions on a daily basis. Some of the most common security decisions made by these businesses include locking their doors, fitting alarm systems, and ensuring that trustworthy employees work behind their counters (Porter, 2009).

The second factor demonstrating the business need for information security is likelihood of these businesses to lose their entire businesses if they lack effective protection measures. When a small business is careless about information technology security, it is likely to lose the entire business because of the impact on the company's reputation. In essence, small businesses are usually open for business as they want customers to come in and make purchases. If these businesses are careless about safeguarding their information, they damage their reputation and lessen the number of new and...

...

This in turn contributes to loss of profits, which contributes to significant implications on the business operations. In some cases, these businesses face lawsuits if such carelessness contributes to loss of a customer's personal information. Therefore, ensuring IT security enables small businesses to protect themselves against loss of profit, enhance their reputation, and lessen the costs of litigation.
Information Security Threats and Vulnerabilities:

Even though technological developments have numerous advantages for individuals and businesses, the cyberspace is increasingly becoming a dangerous place to be because of the ever increasing information security threats and vulnerabilities. Similar to large businesses, small businesses are facing the need to pay more attention to the dangers of cyber crime in order to avoid dangers brought by carelessness. While small business owners are experts in their respective business areas, they have minimal knowledge about computers, software, and networks. There is a wide range of information security threats and vulnerabilities that are carried out by cyber criminals.

These threats and vulnerabilities can be classified into two i.e. external and internal threats. The external threats are carried out by cyber criminals and information warriors, hackers, hacktivists, and experimenters and vandals (Porter, 2009). Since they are amateurs, experimenters and vandals carry out their activities to make a reputation for themselves or for the thrill. On the contrary, hacktivists are driven by personal or political agenda while cyber criminals are driven by financial gain. In contrast, internal threats and vulnerabilities come from within the organization and account for 80% of information security problems experienced by small businesses. Similar to the external threats, the target of internal threats is to access an organization's systems and information.

According to Popa (2013), the most commonly overlooked threats and vulnerabilities for small businesses include malware…

Sources Used in Documents:

References:

Hutchings, A. (2012, February). Computer Security Threats Faced by Small Businesses in Australia. Retrieved from Australian Institute of Criminology website: http://www.aic.gov.au/publications/current%20series/tandi/421-440/tandi433.html

Kissel, R. (2009, October). Small Business Information Security: The Fundamentals. National Institute of Standards and Technology, U.S. Department of Commerce.

Popa, C. (2013, April 1). Ten Most Overlooked Security Threats for Small Business. Retrieved June 20, 2014, from http://www.theglobeandmail.com/report-on-business/small-business/sb-tools/ten-most-overlooked-security-threats-for-small-businesses/article593438/

Porter, J. (2009, August 11). Descriptive Text for the Visually Impaired. National Institute of Standards and Technology, U.S. Department of Commerce.


Cite this Document:

"Computer Security For Small Businesses" (2014, June 20) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/computer-security-for-small-businesses-189997

"Computer Security For Small Businesses" 20 June 2014. Web.16 April. 2024. <
https://www.paperdue.com/essay/computer-security-for-small-businesses-189997>

"Computer Security For Small Businesses", 20 June 2014, Accessed.16 April. 2024,
https://www.paperdue.com/essay/computer-security-for-small-businesses-189997

Related Documents

Small Business Taking a small clothing store to the online world is a bold proposition. There are a few strengths that this store can draw upon to help it succeed. The first is the name recognition of the Jersey Shore -- people actually know where it is now and that will help the store by putting it into some context. (We will assume that the context is good, at least for

Computer Vulnerabilities Computer Security Vulnerabilities The extent of the problem This is not a small issue. The book "Analyzing Computer Security" lays out the following scenario: "First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, and eventually severe loss of power on America's East Coast" (Pfleeger & Pfleeger, 2011, 3). The authors are talking about

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Video Tape and Disc Rental Rentals Catalog/Mail Order Retailing Health and Personal Care Stores Retailing Table 2: Comparisons of Most Risky Small Business (BizStats.com, cited by Telberg, 2003) An Engine of Economic Growth More and more, Craig, Jackson and Thomson (2007) argue, policymakers perceive the small business sector "as a potential engine of economic growth. Policies to promote small businesses include tax relief, direct subsidies, and indirect subsidies through government lending programs." These authors stress that encouraging lending

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Computer Security by Rozeberger and Zeldich. The tutorial gave a basic overview of computer security, including viruses, worms, and Trojan horses. It discussed how to avoid attacks or at least to become aware of the potential of attacks. The tutorial also looked at how hackers work, to help explain how breaks are performed. I chose this tutorial because I believe that computer security is one of the most significant