Organizational Security Planning

As the CIO of our company, I encounter a lot of threats to security and we need to be aware of what they are and how to overcome them.  One of the biggest threats are hackers.  This is also one of the more dangerous threats because it can directly impact our customers.  We run credit cards, billing, and payment information through our systems; If someone hacks into the systems, all of our customers’ information is available to them.  Two threats similar to this are if someone were to hack into our cloud storage, or a third party breach into the systems.  Both of these dangers put all of our information that deals with the business, and other businesses that we are involved with at risk.  If any of the supply chains are having security problems that can be a threat as well, since they have all of our information.  Finally we must be careful to watch out for spammers, as they can mislead to steal information.   

We have several systems at risk for these manipulations.  For one, our computers are subject to being hacked.  Being the main system that we use makes it crucial for them to be secure.  Also, Google Drives within our computer systems can be hacked, or information and files can be misplaced.  We also need to be careful with our credit card systems, as if they are hacked, all of our customers’ information can be stolen.  In relation to this, the wifi systems can be hacked, and then anything that runs on the wifi can be taken over.  The programs we use to create spreadsheets for billing and other information can be hacked, and without that information we cannot run our business.

With all of these issues and threats it may seem impossible to keep them away, however I have come up with a list of things we can do to make an effort to keep our systems as secure as possible.  With your cooperation, we are hoping to be able to make a safer environment for our customers and you.  Our goal and number one concern is your safety.

First and foremost, we need to start limiting what information is available to the public.  The bare minimum should be shared, only enough necessary for them to understand our business and how to become a customer.  In the same way we limit what the public knows, we need to limit the information the supply chains have.  If we limit this information, then if the supply chains are hacked, we can ensure that most of our information can stay safe.  We will also be changing the systems on the computers to limit the information they have access to, so we appreciate your compliance by not changing any settings back when prompted to.  It would also be appreciated if you would keep your Google Drive projects private, and keep backup files for everything you complete.  Finally we will be upgrading our cyber security insurance, to keep our customers, employees, and business safe. 

 

Sources:

“Top 3 Cyber Threats We See in Food & Beverage Manufacturing Supply Chains”, CybelAngel, March 1, 2022, Accessed July 3, 2022, 

https://cybelangel.com/top-3-cyber-threats-we-see-in-food-beverage-manufacturing-supply-chains/

 

Leave a Reply

Your email address will not be published. Required fields are marked *