Preview

Preventing Security Breaches

Satisfactory Essays
Open Document
Open Document
485 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Preventing Security Breaches
Preventing Security Breaches
Nicole Lee
BIS 221
January 19, 2015
Nabih Zourob
Preventing Security Breaches
In week two’s C discussion on preventing security breaches I picked the article Global News & Analysis. This article talked about all of the different kind of breaches that include companies, social media, and healthcare. Often times we go to the doctor not realizing that all of our personal health information is being saved, and if not protected by the office our information can become breached. Facebook is another way personal information can become breached. This is due to hackers locating Facebook pages then sending emails that are designed to look as if a friend sent it. This email will include a link that tells you to log back into Facebook in order to view the message. By doing this it leads hackers to a file onto the IT administrator’s computer allowing them to download sensitive and personal information. When it comes to breaches, 92% of them are avoidable. According to this article and PrivacyRights.org, in the last 5 years more than 562 million records have been compromised in businesses. As stated by this article and the Cloud Security Team at Bruva, preventative measures can happen by:
- using DAC (data access control) breaches can be reduced by 42%
- using source data encryption breaches can be reduced by 28% and,
- using secure data backup can reduce breaches by 32%
By using these preventative measures businesses can save the U.S $44 billion dollars, productivity and time associated with recovering data from a breach. Also stated in this article was how 70% of security breaches occur because of an end user error. This is why it is necessary to insure ourselves with better technology such as backup data loss prevention and encryption to defend data from human error, as stated above. We have to remember that hackers invent new methods every day to get their hand on important information, and that is why you can never be too careful when it

You May Also Find These Documents Helpful

  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The article was considerably valid as was demonstrated by credible news programs and other articles. The importance of keeping patches and antivirus signatures up to date, to help prevent these types of attacks was discussed in detail. Users selecting strong passwords was also discussed, and revealed as a key component in the ability to compromise these accounts. This article was valuable and affected a lot of people. It is clear that there are prevention methods that can be used, to secure your…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Anthem Syndrome

    • 340 Words
    • 2 Pages

    Having an encrypted data is good but it is not enough when such large scale of breach has been done which most likely…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The word 'privacy' means different things to different people, it affect both personal and business. As individuals, we need some amount of privacy to succeed. As a person we need to protect our thoughts from intruders because if others new our must intimate thoughts they could use that information to manipulate our decision making process. Business, need to protect their trade secret and information they collect from their customer to succeed. My objectives for this week e-activity consist of, evaluating the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Facebook is an online social network that allows users to create detailed online profiles and connect with other users, with an emphasis on social relationships such as friendship. This network let users share information with other approved users, such as one’s gender, age, interests, educational background and employment, as well as files and links to music, photos and videos. As concerns about online privacy grow, users of social media sites are increasingly looking for new way to improve their social media experience by posting more personal information and intimate picture about themselves. A class action…

    • 820 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Business

    • 350 Words
    • 2 Pages

    It's always been absolutely key for business to protect their data, it's protecting their intellectual capital, their brand image, it's protecting their customer data and there employees data, and it's absolutely critical for business to do that in a secure way to be able to not only back up for store and retrieve data according to their business requirements and according to the requirement s laid down by regulators. We're living in a digital age and we're surrounded by media telling us how risky the world is for example, pandemic, terrorism, security threats and climate change might be making more frequent occurrences such as hurricanes or floods which can prevent people from continuing to do business or even prevent employees from getting into work and so it's really key for business to have a plan that enable them to get back to work continue with their operations and continue brining in revenue.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Crimes

    • 2557 Words
    • 11 Pages

    The Computer Crime and Security Survey, issued by the Computer Security Institute (CSI) and the FBI, reported that 85 percent of the 538 firms and governmental institutions surveyed found security breaches in 2000. Sixty-five percent admitted that such breaches had caused financial losses. The 186 respondents willing to quantify their losses claimed they totaled $378 million, a 42-percent increase from 1999 and the highest amount recorded since the surveys began in 1995. Seventy percent cited their Internet connections as the source of security problems.…

    • 2557 Words
    • 11 Pages
    Powerful Essays