The consequences of cybercrime are very costly to any organization.
Discussion 1
.
Respond to two colleagues (BELOW): (Half a page each and please, provide each reference separately)
Discussion Topic
Cybersecurity policy development has changed throughout the past 20 years. How has this impacted current enterprises? Are the corporate policies designed to protect the employees as well as the organization?
Post from colleague 1
Cybersecurity policy development has changed throughout the past 20 years. How has this impacted current enterprises? Are the corporate policies designed to protect the employees as well as the organization?
Cybersecurity policy development is the design of security policies and rules which guide an organization in managing its risk. The policies address the various threats, outline the rules of engagement, and interact with employees to ensure they understand and follow the set guidelines.
The technological advances over the years have led to many business transactions to take place over the internet. While the internet has developed quickly as a means of business, so has new emerging risks targeting the organization’s vulnerabilities. Internet connection opens up the probability of a hacker to target your organization. Cybercrime has become a big business and hence the need for cybersecurity policy developments that focus on cyber risk to organizations globally. Lack of proper cybersecurity plans and procedures leads to more reputational and monetary risks being encountered by such companies.
The consequences of cybercrime are very costly to any organization. Therefore, this has forced more companies big and small to invest more in cybersecurity developments to come up with better ways of tackling these threats. These policies involve new technologies, processes, structures, and practices that are used to secure networks, systems, data, and programs from unauthorized access or damage. Organizations have been forced to ensure that data intergrity and confidentiality is enhanced to avoid reputational damage, legal action, and hefty penalties in case of any breach that may arise.
The organizational policies are formulated to protect both the employees and the organization. These policies and procedures determine the rules of conduct within a business, stating both the employee’s and employer’s responsibilities. They exist to protect the rights of workers, including the business interests of employers. Such a policy is the employee conduct policy, which indicates the requirements of an employee at the place of work. That is the responsibilities, rights, duties, workplace safety procedures, harassment policies, dress code, and internet and computer usage. It also defines the actions employers can take in case the said rules are not adhered to, including termination of employment.
References
Moschovitis, C. J. P. (2018). Cybersecurity program development for business: The essential planning guide.
Copeland, T. E., Weston, J. F., & Shastri, K. (2014). Financial theory and corporate policy. Harlow, Essex: Pearson.
Post from colleague 2
Hello everyone,
Everyday thousands of electronic business transactions and multibillion-dollar deals take place across the Internet. Technology has become an integral part of modern society and undergone numerous advancements over the past 20 years. However, one ill effect of this digital age is the global rise in the number of cyber-attacks. Businesses are more vulnerable to being hacked now than ever before. Hackers have honed their skills using innovative techniques to detect flaws in enterprise security and breach different companies’ information systems (Roohparvar, 2017). Fortunately, developments in cybersecurity policy have helped minimize the damages caused by many of these attacks.
Under current law, all federal agencies are responsible for securing their own information systems as well as for protecting those that run the nation’s critical infrastructure. In addition, Congress has enacted legislation which addresses a range of other security issues, including data breach prevention and response, cybercrime and law enforcement, and the Internet of Things (Fischer, 2016). The Obama Administration expanded these plans of action even further by issuing a directive that outlines how the government will respond to any type of cybersecurity incident regardless of sector.
Business owners, forensic experts, and policymakers have all expressed an increasing concern in protecting information systems from cyber-attacks, with most of their policies designed to defend both employees and the organization. But even though risk management is fundamental to establishing an effective cybersecurity strategy, many of these needs come at an extremely difficult time. The future actions of Congress and the executive branch will surely have significant impacts on the design and consensus of the world’s impending technology.
References
Fischer, E. A. (2016). Cybersecurity issues and challenges: In brief. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/misc/R43831.pdf
Roohparvar, R. (2017). How new technologies affect cyber security. Infoguard Cyber Security. Retrieved from https://www.infoguardsecurity.com/new-technologies-affect-cyber-security/
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.