Information security threats

Document Type:Thesis

Subject Area:Technology

Document 1

Technology keeps on changing and the more it has become incorporated in different activities, the more it has presented challenges. Some people have supported the use of technology because of its benefits but others have opposed it because of the security threats associated with its use. Technology use has both advantages and disadvantages. However, in the globalized economy, people have used technology because it is the only and main way of creating and maintaining close relationships with people. When using technology, people should understand the different threats associated with its use because this will lead to the implementation of measures and strategies that will provide solutions. Some companies have also applied to hack to get to know the competitive strategies implemented by their rivals in the market.

Sign up to view the full document!

The only way to avoid the impact of information security is through having an understanding of the different methods of dealing with the challenge. The common information security threats that have affected negatively on individuals and corporations include; Attacks on the social media Currently, people have identified the internet as the best way of interacting and connecting with people. Business has also used the social media platform as a way through which they advertise and market their products to the consumers. Cybercriminals have however developed strategies and measures, which they use to tap information as it is shared through the internet. Every unsecured connection with the devices implies that there are more vulnerabilities (Whitman, 2003). The world has embraced technology innovations and it is important because it has also provided a better way of communicating, interacting and performing business operations.

Sign up to view the full document!

Despite the innovations, the developers have failed to implement the security strategies and this has increased the vulnerabilities of the users. Insecurities have developed and made it hard to rely on the devices to share important information and data. Mobile malware After the developers realized the connectivity of the mobile devices, they realized that there was room for vulnerabilities, which implied that insecurities would make it hard for business operations to remain successful. The criminals do controlling business operations where they deny access to the employees who operate in the sites (Siponen, Mahmood & Pahnila, 2014). People may lose their money where they transact with the criminals who operate on behalf of the companies. An example of a company that has suffered from the third party entry is the HVAC vendor.

Sign up to view the full document!

The contractor was affected where the customer credentials were stolen. This affected approximately 70 million customers and it made it hard for them to trust the company in its future operations. Every organization should develop the right software that will have the ability to defend the known and unknown threats. However, some organizations have failed to use the right software meaning that when a new malicious attack takes place, the software will not secure information since it does not have power over the attack (Jouini, Rabai & Aissa, 2014). It also implies that when an old software is hit by a new attack, it might not be detected and will result in more damage to the business operations. This security threat seems to have affected a large number of companies that take long before developing the right technology to handle business operations and to secure information and data stored or shared through the devices.

Sign up to view the full document!

Social engineering Cybercriminals have realized that their intrusion techniques have a shelf life and there is the need to keep on changing to align with the current trends. One of the sectors that handle sensitive information is the healthcare facilities (Pillai & Andley, 2010). The sector has to adhere to the guidelines provided by HIPAA to ensure that all information and data is secured. The use of the different tools enables companies to encrypt information from one end to the other, which means that the hackers or any other criminals will not have an opportunity to alter the business operations. Some organizations do not have encryption, which means that they will have a hard task dealing with the problems presented by the cybercriminals once they get an opportunity to attack.

Sign up to view the full document!

The security threat will continue affecting organizations that have failed to comply with the security requirements of different corporations. The use of mobile management tools has not made firms successful because some of the employees use their personal devices to communicate and share information related to business operations (Keller et al. There are many loopholes associated with the use of mobile devices to perform business operations. Organizations have not managed to implement the right measures and strategies that will have a positive impact on business operations. Dealing with the loopholes has remained a challenge and the cybercriminals have used the opportunity to access more of the confidential information and use it for the unintended purposes. Some companies have not also prioritized the securing of mobile devices and this has given the cybercriminals an opportunity to access and use information.

Sign up to view the full document!

Some of the methods used in ensuring that there is safety in sharing and storage of information are through end-to-end encryption, use of backups and firewalls and creating awareness in organizations on the different ways through which employees should take caution when using devices and the internet. The use of updated technology has also called for the use of advanced software that takes care of the security needs of the corporations (Wang, Xiao & Rao, 2015). It is important to understand that almost every corporation that uses technology faces one or more of the security issues and has to deploy the right measures that will secure operations. The management of every company has to use the best and most effective security measures that will make it easy to cope with the insecurities that may have a negative impact on the businesses.

Sign up to view the full document!

Individuals should also take care of their day to day activities so that they do not end up giving the cybercriminals a room for accessing information and data they share or use in their devices. The security issues associated with technology use seem to increase with an advance in technology. This has a negative impact on business operations, especially where customers do not trust companies when data breaches occur. The management of every company should understand the different security issues and implement the right measures and strategies that will make their companies safe. The employees and individuals should be aware of the ways in which they contribute to insecurities and ways through which they can enhance the safety of information and data in companies and in their devices.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable