Network Security
Considering, just about each month all hardware and software will potentially need updates to either function well, protect against viruses or outdated apps that could lead to corrupted data. Other potential issues may be unexpected crashes, unrecognizable emails or even a sluggish system performance that might cause severe damages leaving your system vulnerable to be breached. It's important that we continue to practice counter measures, conducting annual training to recognize these threats. Therefore, all employees should continue to update their antivirus software and remember to block malicious spam or emails that could compromise all sensitive information. Human errors can place companies or individuals in legal repercussions. Therefore it's important to avoid user errors that can lead to theft or loss of data
I found this very common that people have the same passwords that are often reused across multiple applications which is fairly easy to remember. I too find myself having this due to laziness and convenience. Note, having this mindset can lead to insider threats, hacks or lockouts that can cause a vast amount of damage to yourself and others. In these cases it is highly recommended to create strong, complex passwords that you should change once every quarter to prevent any vulnerabilities that could expose employee’s financial information, social security or any other frequently used data from applications to be breached.
Some companies or businesses surrounding computer systems sometimes rely on other third party services that can cause various weak security practices. For example, Insomniac Gaming Studios is a studio that creates well polished games for PlayStation. Due to including other studios to help with distribution and training with development of various engines. This led to a breach of their employees personal information and leak of documents causing Sony to have the hacking group turnover all sensitive files or face jail time. This breach led to a significant loss of intellectual property greatly hurting the studios reputation.
Finally, this shows us that we should continue to foster a culture that practices security awareness by maintaining updated hardware and software. To navigate through these challenges we must adopt a proactive approach that includes implementing security practices. This will allow employees to counter these threats recognizing these potential vulnerabilities. Therefore, it's important in understanding these threats as technology advances, continuing updates on future tech or developing effective strategies to prevent security breaches that could jeopardize vital information or files that may be crucial to everyone surrounding this field.
Reference:
Singh S., Jeong Y., Hyuk J. (2016). A survey on cloud computing security: issues, threats, and solutions. Retrieved from: Sciencedirect https://www.sciencedirect.com/science/article/
Singh S., Jeong Y., Hyuk J. (2016). A survey on cloud computing security: issues, threats, and solutions. Retrieved from: Sciencedirect https://www.sciencedirect.com/science/article/
Pourrahmani H. (2023). A review of the security vulnerabilities and countermeasures in the Internet of Things solutions. Retrieved from: Sciencedirect https://www.sciencedirect.com/science/article/
No comments:
Post a Comment