Reference no: EM131674838
Write review on this topic with 2 references in APA format.
In a recent survey sponsored by AT&T, only 53% of companies with fewer than 50 employees placed a high priority on cybersecurity (Kantar Millward Brown, 2015). The same survey showed that only 30 percent of smaller companies have an employee-training program in place to bolster their knowledge of cyber security (Kantar Millward Brown, 2015). Businesses and individuals are routinely hacked.
The Privacy Rights Clearinghouse reported 33 breaches in the month of September 2017 alone (Privacy Rights Clearinghouse, 2017). This is a startling figure and one that ought to inspire vigilance on the part of individuals and business-owners alike when it comes to information security.
It seems that the question is no longer whether or not an organization will get breached, it is more a matter of when. For reasons outlined above, as well as a biblical obligation to the truth, I would disclose the negative findings on the report. An information security professional should be objective and willing to confront challenges such as this when necessary.
By glossing over a legitimate security issue, not only are you putting the business at risk, but you are also placing the private data of others at risk. This is not something that should be taken lightly.
The Bible reminds us in Proverbs 27:6 that, "Wounds from a friend can be trusted, but an enemy multiplies kisses." That is to say that it is better to be honest with someone, even if it causes some temporary discomfort. When one is in the position to steward the information of another, every precaution should be taken to ensure that trust is not broken.
Beyond the biblical and professional obligations, it also will speak to others around you as to your integrity. This could also be helpful in the workplace as you strive to advance within your organization. References Kantar Millward Brown. (2015). The impact of technology.
|
Discuss the prescription confidentiality law
: In 2007, the Prescription Confidentiality Law was passed in the state of Vermont. One of the key measures of the law stipulated that without a doctor's consent.
|
|
Which properties would you find less useful
: Discuss how you might go about identifying that mineral using some of the mineral identification properties discussed in Chapter 1.
|
|
Examples of human resource management strategies
: What are some examples of Human Resource Management strategies that have caused an any Airline to fail or hinder their sucess?
|
|
Determining the payer mix for maximum reimbursement
: Analyze how third-party policies would be used when developing billing guidelines for patient financial services (PFS) personnel and administration.
|
|
Write review on high priority on cybersecurity in companies
: Smaller companies have an employee-training program in place to bolster their knowledge of cyber security - individuals and business-owners alike
|
|
Customer feedback that businesses are requiring
: Have you been aware of the ever increasing amounts of customer feedback that businesses are requiring?
|
|
What test did the court of appeals use to come to conclusion
: For more than a century, a memorial, 43-foot, Latin Cross had been present at Mount Soledad, but in 1989, the city of San Diego was sued on grounds.
|
|
Explain critical thinking
: Critical thinking is an important part of problem solving, decision making, and everyday life. So, what is critical thinking and why is it so important?
|
|
Incorporate grocery stores into some locations
: When Wal-mart decided to incorporate grocery stores into some locations and created "super centers," was this business-level strategy of differentiation
|