Why Is Cybersecurity Important

Great Essays
Why Cybersecurity is Important for Every Company. In today’s world, almost every single business, from small to large corporations, needs to have an online presence to grow and increase their customer base no matter what the focus area of the company is. For example, it does not matter if the company is specialized in food, clothes, insurance, car repair, phone service. In addition to having an online page, when companies grow they also need a computer network to facilitate communication between their employees, customers, and business partners, as well as to store information about the company such as customer, employee, products, and financial data. Having all of this in place does not guarantee success and grow for a business because there …show more content…
Some countries have regulations in place that requires companies to have cybersecurity measures in place to protect the information of its customers. According to an article written by John Patrick Pullen in 2013 titled “How to Protect Your Small Business Against a Cyber Attack”, the following steps are some of the most important steps and are a must for every company to keep their assets protected. The first step in Pullen’s list is to encrypt the data, all the data that could mean potential harm to the company if an unauthorized person had access to it such as employee social security numbers, banks accounts from customers and employees. The second step in Pullen’s list is to implement security on the hardware. In other words, only the people that should have access to a company’s devices, such as the server room, should have access to them. Also, if the company uses mobile devices, a tracking software needs to be installed on the devices to prevent the loss of company assets. The next step in Pullen’s list is to lock network …show more content…
In fact, according to the article “Cyber Attacks on U.S. Companies Since November 2014”, in 2015 “companies saw an average of 160 successful cyber attacks per week, more than three times the 2010 average of 50 per week. Every company surveyed was the victim of a Trojan, virus, or worm type of attack. Ninety-seven percent surveyed were reported to have been the victim of a malware attack and 76 percent were victim of a Web-based attack. Just as worrisome as hackers trying to get into a network system are those with malicious intent who already have access to a system. Forty-three percent of companies reported cyber attacks by malicious insiders and 36 percent of companies suffered attacks as the result of a stolen device” (Walters). In the last couple of years, some of the major attacks were ones that affected the customers or employees of the companies or a large amount of money was stolen through the attack. For example, according to the same article written by Riley Walters, form November 2014 to October 2015 there have been many cyberattacks that had a big impact on their target. Some of those companies affected were, Sony Picture Entertainment, Las Vegas Corp, Staples, Uber, Anthem, Trump Hotel Collection, Excellus BlueCross BlueShield, and many more. In between that list, there are some that stand apart from the others such as the

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Supervalu Cyber Attacks

    • 208 Words
    • 1 Pages

    SuperValu was attacked between June and July, and suffered another malware attack between late August and September. The first theft included customer and payment card information from some of its Cub Foods, Farm Fresh, Shop ‘n Save, and Shoppers stores. The second attack reportedly involved only payment card data. I believe cyber attacks are way too easy to do nowadays, because companies don't think it can happen to them so they don't prep for it. SuperValu and all these other companies that got hacked later in the years should have had better security than the companies that were hacked at the beginning.…

    • 208 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    1. Social networks can be used in a business setting as a tool to help employees interact with their colleagues, as a tool for marketing, and as a tool to gain information about potential customers. 2. I can use web services for my site to help me gather data on potential customers, to provide suggestions to existing customers, to process payments, and for many more activities. 3.…

    • 712 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Zunis Investments

    • 1339 Words
    • 6 Pages

    We will also establish proper controls, on the physical security side, the use of CCTVs, sensors, card scanning entrances and exits make people aware but also security conscious. In terms of database security, the principle of least access will be applicable. All non – essential staff will not have access to passwords for production databases and servers or any other systems not needed for normal job functions. Spam filters will be applied to outgoing and incoming email and chat services To combat hardware attacks, Zunis will now make use of hardware that meets good business practices in addition to defined SLAs agreed to by Zunis and the vendor. All work machines will come with regularly updated and already pre-installed antivirus software.…

    • 1339 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The Target hack of 2013 resulted in the loss of 40 million people’s credit card numbers, and the loss of 70 million people’s email address, phone numbers, and more. The majority of retail stores focus on selling their products to consumers. The security for retails stores can receive very little attention. Target was working to increase their IT security by hiring Fireeye to install a 1.6 million dollar security system. The system would send Fireeye notices of any security breaches.…

    • 827 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In the digital age, a huge data security breach or a major power outage can cost a healthcare organization millions in damages. That’s why IT security experts suggest that companies should be up to date with their data security to prevent loss of valuable company data. Data theft and network security breaches are now becoming more prevalent, due to the advancement in technology that’s being used by cybercriminals. IBM Security recently sponsored a survey that revealed massive cyber attacks on the data systems of health organizations cost around $380 per file. It’s 2.5 times more expensive when compared to data breaches affecting other industries.…

    • 255 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Internet Security/Cyber criminal 1. Explain how Internet security measures can actually create opportunities for criminals to steal, rather than prevent them. The onslaught of security breaches on the internet make the threats to e-commerce very real for business, consumers, and government, and politician. There are individuals that hack into computers as well as the networks of businesses and government agencies.…

    • 606 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity In America

    • 899 Words
    • 4 Pages

    United States cybersecurity is arguably as important, if not more so, than the US Military. The private sector, civilian businesses and personnel, lost more than $1 trillion in 2008 as a result of cyberattacks. The $4.5 million Predator military drone, had its camera feed hacked by a $26 dollar piece of software widely available on the Internet (Marshall,1). Neither the government nor the private sector is immune to security breaches, but which group is better equipped to protect America’s interests?…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyber-terrorist have the ability to access bank accounts, shut down systems, and send malicious viruses to ordinary citizens from the comfort of their home. The ability to operate from remote locations across the globe to find vulnerable links between cyberspace, physical systems, records and infrastructure is the mission of Cybercriminals (Smith, 2015). The development of a national policy and regional sharing of information is critical in combating cyber-attacks, cooperation across state and local government is essential for national security (Vaseashta et al., 2014) Increasing the awareness of cybersecurity and using the Framework for Improving Critical Infrastructure and encouraging organizations to manage cybersecurity as part of an all hazards approach to reduces the risk of a cyber-attack (2016). It should be noted, educating the public and private sector may be the best way to prevent or reduce cyber-attacks, we must find ways to secure our network, shield our data and improve our security to counter any cyber-attacks against the infrastructure of our systems (My digital shield, 2015).…

    • 1394 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    1. Executive Summary Listed on the Hong Kong stock exchange since 1992, Li & Fung (“LF”) is a Hong Kong based company established more than 100 years ago by Fung Pak-Lui and his partner Li To-Ming. LF provides a holistic supply chain management and value addition at each level of supply chain at a global level (see Appendix A). In its earlier life, LF did not owned any of the boxes of the supply chain.…

    • 2795 Words
    • 12 Pages
    Great Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays