Importance Of Cyber Security
Cybercrimes are a global threat where criminals can be located anywhere around the globe as long as they have a computer with access to the Internet. In recent times we see and hear there are so many reports under cybersecurity. These hackers plunder the valuable customers information like their account name. Id’s, passwords,codes etc. As per the research at present, many organizations are going through this security breach. In this discussion as per my boss mentioned, it clearly states that there have been some strange things going on the back stage. One thing here undoubtedly visible is, that hacker has tried in multiple ways to get the date from our organization. Through anonymous calls, spam emails and checking for trash dumpsters. In order to protect our organization data, we have to take immediate security measures and tighten up the rules and regulations of the company.
Recommendations: Every single employee must be trained regarding to this security breach and hacking issues. They must know about these problems, and they need to learn and be aware how to answer those calls. The employee should follow this rule where he/she is not supposed to share any kind of organization details with the random person who is calling to our company. Our organization needs some updation of the strong firewall and high-end antivirus soft wares where it automatically filters this spam emails and block the flagged accounts. Employees must be going through the base session how to handle these kinds of emails and when it is necessary to mention to their higher officials of the organization. Dumpster diving can mean looking through physical trash for such information, or searching discarded digital data. In this scenario, security experts should warn users to leave a clean trail to prevent identity theft and avoid other consequences that can stem from a successful dumpster diving operation. The rule should be created where only some particular people are allowed to do controlling access of the computers.
Cite this Essay
To export a reference to this article please select a referencing style below