WEEK 6 RESPONSES

By Day 5

Respond to two or more of your colleagues in one or more of the following ways:

  • Compare your findings to the list of security trends your colleague identified. Look for similarities and differences. Share the insights you gained.
  • Offer additional ideas or recommendations about how the security issues your colleague identified could potentially affect business or the organization your colleague discussed. Provide examples or observations from your experience or readings from the week.
  • Offer your thoughts about potential ways that business or the organization identified by you colleague could mitigate or eliminate the risks posed.
  • Share how the trends identified by your colleague could impact or potentially impact your organization or one with which you are familiar. Discuss how your organization could mitigate or eliminate the risks posed.

 

 

 

2 days ago

 

Jacob Stringer

RE: Discussion 1 – Week 6

COLLAPSE

       Cybercriminals are always looking to stay ahead of cybersecurity. One trend that has increased has been business email compromise (BEC) scams (Creating a culture of security, 2018). Working in healthcare, it is common to receive these emails. I have received a few emails myself, and my current organization periodicals sends out emails to make people more aware of suspicious emails and not to click on any links. One previous hospital I worked for was actually held hostage by a hacker for three days and literally crippled the hospital until the ransom was paid. Even Google and Facebook was tricked into paying 100 million to a man who falsified supplier invoices (Creating a culture of security, 2018). Anyone and any organization can be affected by these emails. Systems have to be secure, and individuals have to be aware of suspicious emails.

       Another cyber trend is an increase in mobile malware. Hackers are trying to find ways into organizations and almost everyone has a mobile device at this time. Hackers are even using unsecured medical devices as entry points into healthcare organizations to steal data and install ransomware as well (Exposed Devices, 2018).

       Mangers need to ensure what information systems they currently use are secured and upgraded. Any new technology, which could include software or hardware must be secured when being installed. Lastly, humans can accidentally or deliberately leak information. Providing education and/or a creating a written policy that clearly states what is expected and ethical must be created and enforced. Both trends above really focus on the human aspect, especially using curiosity when opening BEC’s. I think it is a great tactic that our IT department utilized, by sending fake BEC’s to test people and keep them vigilant. This is a tactic I would employ as well as possibly bringing in an expert or consultant to test the system for any holes or leaks. Even small breaches can equal big fines and money spent on consulting fees would easily offset expenses accrued from a fine. No organization wants to be in the news for a security or data breach.

 

References:

Creating a culture of security. (2018). Acuity5(6), 66.

Exposed devices and supply chain attacks: Overlooked risks in healthcare networks. (2018). Healthcare Purchasing News42(5), 6–8.

Kerner, S. M. (2016). Infection Data Shows Rise in Mobile Malware Development. EWeek, 6.

 

1 day ago

 

Toni Penn

RE: Discussion 1 – Week 6

COLLAPSE

The two trends that relate to security data consist of end users being the main target for hacking and the main focus of security (Paredes, 2015). By users using social media, online transactions, or even storing data into a system that is not a private location leads to outside sources having access to personal information. Within an organization, it is important to secure the end users which are mostly employees within an organization who have access to devices and constantly having programs running. This is why our system gives mandatory shut down policies for leaving your workstation daily. It occurs that over the weekend, a lot of security measures are broken due to the controls of corporate network and being out of the network location (Paredes,2015). This causes barriers between network systems within the organization and security breaches regarding client and employee information. When someone has breached the privacy of another system, this can be a cost expense to repair and a lot of customers will be affected (Bélanger et al., 2019). Another trend would be our mobile devices and certain applications that are still running in the background that causes data to transport from one device to the host of the application. This trend has caused invasion of privacy due to the on-going data running in the background. For example, TikTok not only has access to our personal information through their application, but it also has access to the security of our phones. This information is still being discovered, but has a few proven records that indicate how the privacy was recognized as a security threat to users (Stokel-Walker, 2019). Our data within our cellular phones are constantly running in the background, unless the application is deleted, or on offline mode. This makes a impact on our organization and informing teachers of the code of conduct and how to properly use devices and how to shut off programs that are not in use for security purposes.

The main challenge with this trend consist of not having the proper training on when to shut systems down, the benefit it carries and how it protects the information withheld within the organization. The risk conclude of having our information copied and sent to competitors. This could seriously jeopardize our company and the privacy that our company holds. We have parent and student information that are confidential and without the proper security measures it adds higher risk of intruders within our business systems. These precautions have to be met in order to establish a safe net for our teachers and students to utilize. When systems are shut down improperly, it can damage the data system and cause more glitches until it is reset. The whole procedure for resetting a system is to clear out data, cookies, history and all information that was accumulated regarding the privacy of the user. Of course we all have a option of manually deleting information from a system, but by rebooting a system, or resetting a system, it gives it a fresh start and smooth navigation process. Cookies are stored for personalized information and can be used in a resourceful way of holding information on a private computer versus a public business system (Bélanger et al., 2019).

As a manager, my goal would be to protect the privacy and security of employees, students and parents. My outlook would consist of making sure everyone is knowledgeable of returning devices before their shift is over and understanding how to clear and reset systems individually. This will protect the information of students, parents and teachers. I would also prepare checklist for systems around the organization for students to also become aware of shutting down systems, especially if they are the last class to utilize the systems for the day. This will instill accountability between the center as a whole of doing what is best for the safety of our organization. Parents will also be informed of certain policies and code of conduct that is required when using systems that are connected to the organization. By making sure all systems have anti-virus setups, it will eliminate the small worries of hackers. I would also spend time innovating with our IT department regarding systems that will help our facility as a whole to maintain our privacy and protection.                                                                                                                     References

Bélanger, F., Van Slyke, C., & Crossler, R. (2019). Information systems for business: An experiential approach, 3e. Burlington, VT: Prospect Press.

Paredes, D. (2015). “The user is today’s new corporate security perimeter.” CIO (13284045), 1.

Stokel-Walker, C. (2019). Chinese app TikTok may be leaking users’ data. New Scientist, 3260,

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!
Use Discount Code “Newclient”for a 15% Discount!”

We have Walden University and Capella University nursing practitioners!


Buy Custom Nursing Papers

#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper #Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational