Dealing With IT Security Threats

PAGES
2
WORDS
523
Cite

IT Security There are many types of IT security breaches. There's malware, ransomware, theft of sensitive information, DDoS attacks...the list goes on. The reason that these threats exist is simple -- there's money in it. Ransomware is used to get quick payment from companies, and stolen information can be sold on the dark web. But what companies need to know is that most cyberattacks rely on somebody within the company making a mistake, for the criminals to get the access they need. So training is key to preventing cybercrime. This isn't something that happens randomly -- companies are often specifically targeted, with criminals focused on key vulnerabilities that can be exploited (Ramanan, 2015).

Slide 2: There are a few things that companies can do to prevent cybercrime. It starts with awareness at the highest levels of the company. Two reasons for this -- first off top official need to prioritize the resources to combat cybercrime. The second reason is that the people at the top have the best access to sensitive information, so they are the ones most likely to be targeted. Awareness is not just in general terms -- the awareness needs to be specific. Risks need to be evaluated and measured. The different gaps in cybersecurity...

...

IT security is not a matter for the IT department, contrary to what many people think. Human beings are usually the weakest security link in any organization, according to Kaspersky Lab (2016). People fail to protect passwords, they leave sensitive data lying around, and generally fail to realize that IT security is their problem, too.
Slide 4: There are several best practices. First, using multi-factor authentication for sensitive areas can mitigate the risks associated with losing passwords. It is more difficult to hack an area of the site with MFA. Policies that forbid employees from uploading sensitive data to the cloud, especially on their personal devices, can help avoid some issues. In fact, the use of personal devices for business is one of the key areas of security weakness for many companies. And of course, poor awareness.

Slide 5: Training is the pathway to defending against poor awareness. Many techniques, such as social engineering, phishing and waterholing, depend on users to click something they…

Sources Used in Documents:

References

Kaspersky Lab (2016) The threats from within. Kaspersky Lab. Retrieved December 6, 2016 from http://go.kaspersky.com/rs/802-IJN-240/images/Threats-From-Within-EDU-Ebook%20FINAL.pdf

Ramanan, S. (2015). Top 10 security breaches of 2015. Forbes. Retrieved December 6, 2016 from http://www.forbes.com/sites/quora/2015/12/31/the-top-10-security-breaches-of-2015/#33dcef67694f


Cite this Document:

"Dealing With IT Security Threats" (2016, December 06) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/dealing-with-it-security-threats-2163753

"Dealing With IT Security Threats" 06 December 2016. Web.19 April. 2024. <
https://www.paperdue.com/essay/dealing-with-it-security-threats-2163753>

"Dealing With IT Security Threats", 06 December 2016, Accessed.19 April. 2024,
https://www.paperdue.com/essay/dealing-with-it-security-threats-2163753

Related Documents

Global concerns: Russia, missile shields and cyberterrorism Thus domestic concerns such as internal instability and even energy scarcity have global repercussions that affect NATO nations. That is why, despite the end of the Cold War, tensions between NATO member and non-member nations remain bubbling so close to the surface. It has not been forgotten by the Russian leadership that NATO was founded to address the security concerns raised by the now-defunct

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and