Student’s name:
Professor’s name:
Course title:
[Pick the date]
Introduction
The concept of technological environment is considered to be the most dramatic force in today’s time, which has been shaping our destinies in a continuous fashion. Technology has released wonders in all the fields possible and has greatly been affecting mankind, whether be it robotics, medical science, miniature electronics or businesses engaged in the online market. Almost all the organizations today are connected to the masses through websites which can be availed at cheap costs, and in a lot of cases, even free of expenditure. The credit for this situation can be attributed to the technological advancements made in the field of internet and online business. It is said that there were less than 15,000 domains back in the early 1990s, contrasting the huge figures of 192 million registered domains back in December 2009. Such statistics are proof enough of the fact, how more and more organizations have an individual and distinct entity in the virtual world of e-commerce. This has made the buyer-seller interaction easier and pretty effective. The critics do not hesitate to say that in the coming days, the virtual market might surpass the actual market.
In the recent past few months of this year, a number of tech companies have been hacked into, a few of them being Facebook, Apple, Burger King, the New York Times and NBC. It is believed by some that the responsible parties for such cyber attack has been the Chinese Government, although no concrete proof has been dug out to support the same. The statistics by Symantec, the company behind the creation of Norton Anti-virus state that almost 40% of the cyber attacks committed in the year 2012 were aimed at business organizations with staff strength of not more than 300. Almost all the companies having a domain on the internet are prone to cyber attacks, given the tools and medium of
References: 1. K, Gabrielle. (2013). 5 Steps to Recovery After Your Business Has Been Hacked. Available: http://smallbusiness.foxbusiness.com/technology-web/2013/02/19/5-steps-to-recovery-after-your-business-has-been-hacked/. Last accessed 30th July 2013. 2. R, Riva. (2011). What to Do If Your Business Gets Hacked. Available: http://businessonmain.msn.com/browseresources/articles/onlinebusiness.aspx?cp-documentid=31726409#fbid=vputcsjXLR_?comments. Last accessed 30th July 2013. 3. Pullen, J. (2013). How to Protect Your Small Business Against a Cyber Attack. Available: http://www.entrepreneur.com/article/225468. Last accessed 30th July 2013. 4. Goldman, J. (2012). Nissan Hacked. Available: http://www.esecurityplanet.com/network-security/nissan-hacked.html. Last accessed 30th July 2013. 5. Goessl, L. (2012). Op-Ed: Nissan recently hacked, corporate hacking a growing issue. Available: http://digitaljournal.com/article/323723. Last accessed 30th July 2013. 6. Boulton, C. (2012). Nissan Delayed Revealing Hack. Available: http://blogs.wsj.com/cio/2012/04/24/nissan-delayed-revealing-hack/. Last accessed 30th July 2013. 7. McGlaun, S. (2012). Nissan Gets Hacked, Target Could 've Been Intellectual Property. Available: http://www.dailytech.com/Nissan+Gets+Hacked+Target+Couldve+Been+Intellectual+Property/article24527.htm. Last accessed 30th July 2013.