The Reason behind the Breaches WikiLeaks has released information that has damaged many reputations, including organizations and countries. Nicks (2014) reports that WikiLeaks threated to release information regarding what records …show more content…
Computer security should be the focus for every organization. Organizations can combat cyber terrorism by implementing a recovery process (Easttom, 2012). This recovery process will let an organization that undergoes a security issue recover data, and also recover the entire network if needed. If a security incident occurs because an employee or an outside attacker deletes key information, an organization can quickly recover those files (Easttom, 2012). Further, an organization needs to assess the information they have and decide which information is sensitive, or critical to business operations (Easttom, 2012). This could include identifying the information that has patient information, employee information, or sensitive customer information in it. This will help an organization define a security process for this information that would be stricter than other less secure information. This will save an organization time and …show more content…
Data needs to be protected, and these leaks have shown that this information is not protected. Organizations and nations need to look at policies that will protect this information moving into the future. Technology is growing, and the use of it has made cyber terrorism the new form of terrorism. Organizations need to identify their sensitive information and protect it. Further, organizations need to have a recovery process in place to replace data that may be compromised. National policies are also needed. These should include stiffer penalties for computer crimes. In addition, there should be one site that all organizations and national officials can go to and report a security incident. These steps will help secure data moving into the