Week 8 Midterm Research Project-Privacy, Security, Hacks, and Leaks

  1. Know your enemy: As of Summer, 2020, what are 5 sources/types of potential digital threats to your organization. Examples include external malicious actors or internal human error. Provide a thorough description and examples; be specific.
    1. Cyber terrorists- target businesses, state machinery and critical services that would cause the most harm when tampered with, usually for political interference
    2. Internal user error- not necessarily malicious but can-do extensive damage.
    3. Insiders- these are people who have malicious intent towards your cybersecurity and are looking to infiltrate the workforce inside the company.
    4. Organized Crime aka Cybercriminals- these are the bad guys out for money. They steal sensitive data and personal information to sell to corporations or keep for themselves to use or sell back to you. Most of the time this stuff shows up on the dark web/ black market e.x. social security numbers, etc.
    5. Government-Sponsored Actors- these threats are directly sponsored by government bodies to steal information (personal, intellectual, funds) of another country to further their own gain.

https://www.redlegg.com/blog/cyber-threat-actor-types

 

  1. Know yourself:Identify at least 5 digital processes, systems, and/or functions your company has in place. Importantly, address how could those be exploited or manipulated in order to gain access to valuable corporate or customer data?
    1. One thing my company has invested in is a good cloud backup system and management. Of course, hackers are always out there looking to break into things like the cloud, however with good management and a proper system in place disaster can be avoided.
    2. Collaborative technologies, such as the google suite, are imperative in organizing threat-free technologies. They have to be specifically shared with its receivers and editors to be accessed.
    3. The introduction into AI has been a key components to the ever-evolving technology world. Implementing AI or artificial intelligence into the everyday productivity of a company can be a game changer. Using things like fingerprint access, facial recognition software, and smart agents like Amazons Alexa or Apples Siri, technological help is everywhere and can be beneficial.
    4. Installing and using antivirus and antispyware software on company computers, as well as encrypting our websites for customer user security will be components added to prevent data from being exploited.
    5. Finally, having a secure Wi-Fi network that is protected not only by a password, but a firewall as well, can help keep things that need to be private, private. Having control over your password and making it available only to those who need it are important to keeping the bad guys out and changing it regularly helps keep the bad guys who are in, back out again.

www.capcoverage.com/index.php/10-ways-to-prevent-cyber-attacks/

  1. Develop your strategy: As the chief technology executive, make 5 recommendations that your company should adopt to be more safe, secure, and reliable. Again, consider hardware, software, networks, and human policies and procedures. (e.g., appropriate use policy on corporate computers; firewall; SSL/web encryption; backup/retention)
    1. Keep software up to date- by keeping software up to date there is no room for viruses to get in!
    2. Raise awareness companywide about phishing emails- this allows hackers to get into accounts by posing as a website that you may already have an account for, looking similar and then having you input passwords. NO, NO!
    3. Keeping good password management
    4. Treat your devices like you would your wallet- do not leave then unattended, they contain precious cargo!
    5. Keep personal data personal

www.synoptixsoftware.com/top-7-best-cyber-security-practices-to-keep-your-data-safe

Leave a Reply

Your email address will not be published. Required fields are marked *