Cyber Security Case Study

1242 Words3 Pages

A major challenging impacting organizations, is having a comprehensive security plan that will safeguard the personal information of their clients and employees. While at the same time, it must be able to streamline the different administrative and technical functions. The result is that firms must develop and update their strategies to deal with the changing nature of the threats they are facing. This is because as technology improves, more are increasingly vulnerable to a host of ever changing tactics. The result is that the issue of cyber espionage is becoming a problem. It is utilized to: give competitors, criminal elements and governmental entities access to sensitive information. (Mackie, 2015) In the case of all organizations, these …show more content…

While at the same time, they have to be capable of understanding and addressing key areas of resistance through a hybrid model. The implementation will focus on rolling out new solutions within a 6 month timeframe. During this time, employees will be provided with initial and continuing training. Testing will involve consultants testing the systems vulnerabilities. The service providers will work with this individual to understand what is most important to them and deal with these issues early. In many ways, one could argue that this is the key for staying ahead of the evolving tactics utilized by hackers. (Yeo, …show more content…

This is because it is concentrating on using flexibility and key concepts to assess / address any vulnerabilities. For all organizations, this makes them more prepared for the challenges they will face in the future. This prevents security breaches through taking an all encompassing approach and objectively analyzing what is happening. These changes will help to deal with deficiencies the agency is facing when it comes to contingency planning, security management and access controls. These recommendations will require short term increases in the IT budget to improve training, monitoring and update technology. At which point, everything will be tested to determine if the staff is capable of dealing with key challenges. Over the course of time, these insights will help everyone to understand the threats they are facing, it will help in quickly identifying them and create strategies for addressing them. When this happens, they will be better prepared for making these adjustments. It is this point, when they can be more responsive to the different needs by understanding and evolving with a host of threats. This builds confidence and it ensures that everyone comprehends which procedures are most acceptable and will report any kind of breaches immediately. Once this occurs, is the point organizations can think proactively in addressing these challenges. This will make it more challenging in engaging in various attacks

Open Document