Week 7 Midterm Research Project_Privacy, Security, Hacks, and Leaks

Week seven Midterm Research Project Privacy, Security, Hacks, and Leaks

For this assignment, put yourself in the role of an executive at a small to medium-sized corporation… Let’s say it’s a gourmet food retailer with three stores and an online e-commerce marketplace. You sell approximately one million dollars in goods each year; you have more than thirty five thousand customers, one hundred retail employees and thirty five corporate employees.

You are the chief information officer or the information technology supervisor and you’ve been tasked with helping your organization prevent and manage cyber threats. These threats can come from a variety of sources, and they can impact many aspects of your business. Your job in this assignment is to identify potential threats, assess your organization’s vulnerabilities, and provide advice on how to minimize digitally induced or public relation disaster.

———————————————————————-——–——-–Blog Below–—————————————————————————————-

  1. Know your enemy: What are 5 sources/types of potential digital threats to your organization. Examples include external malicious actors or internal human error. Provide a thorough description and examples; be specific. Make sure your sources are current. Third-party data Breaches and exposure to opponent companies can pose as a digital threat to the organization. According to cybelangel.com, “Teams that are working with external vendors are constantly sharing folders or drives. A single wrong click can leave a cloud drive with thousands of documents exposed.” In other words, it only takes one misclick to leak thousands of data and other companies can take advantage of that data and yes, that includes targeting vulnerabilities.
  2. Develop your strategy: As the chief technology executive, make 5 recommendations that your company should adopt to be more safe, secure, and reliable. Again, consider hardware, software, networks, and human policies and procedures. (e.g., appropriate use policy on corporate computers; firewall; SSL/web encryption; backup/retention). Cybelangel.com alsoe states “Digital Risk Protection Solutions (DRPS) provide holistic detection and remediation for external digital risks.” In other words, DRPS takes precautionary measures in order to keep company data safe. As for a food company specifically, cybelangel.com/food-and-beverage-threats states “Marketing and packaging-related firms unknowingly leave customer data and IP vulnerable…This leaves the door open for adversaries, competitors, and copycats to access and replicate sensitive designs or gain a marketing advantage. In rare cases, stolen packaging design has led to food fraud and consumer hospitalization.” In other words, with customer data dn IP vulnerable to exposure, other companies can take advantage of that too.

This all boils down to third parties (example competitions, copycats, adversaries) getting their hands on the data and using it to their advantage. Luckily, “CybelAngel’s speed and accuracy help a company close the loop on digital risks long before attackers see an opportunity.” In other words, companies like CybelAngel can help enhance digital protection.

Leave a Reply

Your email address will not be published. Required fields are marked *

Skip to toolbar