Wednesday, June 24, 2020
Company Effectiveness In Response To The Security Breach - 1375 Words
Company Effectiveness In Response To The Security Breach (Essay Sample) Content: BUSINESS SYSTEM AND SECURITY BREACHSTUDENTS NAMETUTORS NAMECOURSE TITLEINSTITUTION NAMEDATELevel of responsibility of company- effectiveness in response to the security breachA core Security responsibility is to manage the risks facing a companys information and to determine appropriate levels of protection. This is because numbers of breaches are increasing and have been recorded trending upward. A well-designed criterion can be used to uncover genuine incidents, provide channels of cooperation with stake holders and define escalating processes.Steps to be followed on effective response to the security breach 1 Define Scope and Conduct GroundworkOn how to prioritize investments, Security should evaluate the baseline maturity of its organizations cases of security breach. The response process should be self-diagnostic and it is also important to clearly establish roles on the incident response team by outlining the mission statement so as to determine escalating path s. 2 Provide criteria to detect and analyze IncidentsSecurity uncovers incidents quickly by monitoring the appropriate detection channels. Then, objective analysis for potential incidents in terms of severity levels which is based on various factors such as impact of the business and public awareness. 3 Be ready to contain, recover from Incidents and eradicateTo prevent confusion after uncovering the incident, clear expectation must be in place particularly concerning the organization. Prepare to communicate the incident to all stake holders including customers, media, employees and authorities. 4 Ensure Postmortem LearningThis involves learning from such incident so as to prevent future occurrences which should not be under estimated. Also record should be kept to ensure accountability.Assessment on Responsibilities of third party accounting softwareThird Party software plays a vital role in in a company setup. These include: 1 Ensuring that the proposed relationship between the v endor and the overall business strategy is consistent. This ensures that the companys goals are met. 2 Conducting Cost/Benefit analysis: The Company needs to know its status on its expenses and all the income generated and that cash inflow and outflow. A good analysis of the same will keep the company on toes alerting it of its progress. This helps to know whether the company is making any progress or not. 3 Ensure management has the knowledge and expertise to provide adequate oversight. 4 Estimate the long-term financial effect of the proposed relationship. The third party vendor and the company need to have a healthy relationship that will help both in their endeavors. This is because the company wants to be placed at per with its mission and goal. This implies a good financial effect will always be the core aim for a companyPreventative measures against business being hackedAnything that can connect to the Internet is prone to being hacked. However, there are several actions that can protect one from losing his/her data from this malicious act. These include: 1 Suspicion on mails.Not every mail received is genuine; so many malicious attacks on the Internet have been accomplished through the emails sent. This is because emails are viewed as a platform for sending crucial and confidential data, where the attacker will take advantage of that and use any chance to get to your inbox and transmit the same data to them. As a way of being highly cautious, checking the senders IP addresses will do better. 2 Check link locationsReceived messages from unknown sources might contain links to unknown sites. When you surf to any mysterious website, you get prone to unintended coincidences. This is because they might be mimicking a genuine website and you might fall a victim to phishing scam. On the other hand, the link might be used to propagate malware. This calls for caution when clicking on such links, its best done by copying such links and using them on a new brow ser to verify what the site contains. 3 Be sure when opening attachmentsAttachments also play a very critical part in transmission of malware. Malicious hackers will use attachments for easy download of their codes into your computer. They do this by sending mails that have virus-laden files. This has been a common way for companies to get hacked. The files used are; Exe, PDFs, word, etc. 4 Use two-factor authenticationEvery time a company is hacked increases the likelihood of password leakage. A hacker having a password tries to figure out all the personal accounts that the password owner could be having, through this they are able to access the data stolen. Using two-factor authentication prevents such cases because it will demand a password and say a code sent to the owners phone. This makes it hard for hackers to bypass the security with-holding the information that could have been leaked to the owner. Many companies have embraced this practice for the safety of their data. 5 Use advanced passwordsA strong and advanced password includes a combination of lowercase, uppercase, numbers, gibberish and punctuation. Its wise if a password is not made a personal reference or saved in files. It is also important not to use same password for multiple accounts. 6 Dont share personal data on public Wi-FiAnything that can expose your personal data such as checking your bank account or buying a plane ticket is not to be done in a public Wi-Fi. This is because ...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.