In response to your peers, suggest some controls, best practices, or other practical methods to protect against these challenges.
In response to your peers, suggest some controls, best practices, or other practical methods to protect against these challenges.
PEER POST # 1
Organizations face challenges when detecting data breaches can be daunting just by the sheer volume. It is estimated that by 2025, the collective digital data of the human population will reach 175 zettabytes. Identifying the risks and detecting breaches can be a challenge for even the most profitable and established companies as we’ve seen with huge corporations such as Microsoft and Target. A common challenge would be a lack of monitoring. For smaller organizations this can be due to budget constraints but for organizations with vast resources, it seems as though the challenge is avoiding the complacency that comes along with blindly trusting the current implemented digital security infrastructure. There typically isn’t much warning on when attackers are successful in evolving their attack efforts. Generally, the only way it becomes known is when they attack. So relying heavily on tools or protocols that are at risk of becoming obsolete much earlier than anticipated, lull organizations into a false sense of security. Zero day attacks present another challenge as the name implies, there are zero days for organizations to detect breaches before they start or sometimes even well after they’ve happened. A lack of training and underdeveloped incident response capabilities are challenges that tend to affect older organizations whose operations existed long before the need of more sophisticated information security technology. For instance, senior management falling victim to phishing attempts are a fail to detect a breach. Lastly, insider threats whom may be consistently leaking data or facilitating breaches without being discovered are another challenge. Having internal knowledge and an understanding of the security infrastructure can give them the ability to stay undetected.
PEER POST # 2
One challenge that organizations have in detecting data breaches is that organizations have large volumes of data coming into their network (Cormack, 2020). This data can come from the organizations’ daily operations, employee personal devices, third party services, customers, and internet of devices. Organizations must gather this data to understand what their normal traffic is and what potential dangers are. Even if organizations dedicate the time and budget to their security systems, they may focus on incident response because of the challenge of detecting breaches in a high volume of data.
Another challenge organizations face is not having strong cybersecurity policies and practices in place. This could be due to budget constraints, lack of accountability, or even a focus on incident response rather than defense (Nagar, 2023). Organizations must have some type of protection in place to protect their customer and employee data due to compliance laws. However, keeping up with updates of hardware, software, and new security practices may not be a priority. A lack of a security-conscious culture and security support and resources would make it difficult to detect data breaches in an organization’s network.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
