Saturday, October 19, 2019
Economics Research Paper Example | Topics and Well Written Essays - 750 words - 6
Economics - Research Paper Example ed companies have in the recent times weathered breaches in their technological environments, numerous incidents are never reported and business have avoided publicizing the fact that they have paid ransom to criminals or providing descriptions of their risks of exposure to the attacks. Numerous big corporations have intensely strengthened their information security capacity in the past few years and formal processes have been instigated to point out and classify information security risks in order to develop mitigation strategies. Information security environments have become less open compared to the way they were in the last few years since various measures have been implemented including disabling USB ports and blocking webmail services, additionally, robust technologies have been installed to ensure security around perimeters. Risks to information security continue to increase and data has become increasingly pervasive, with more institutions facing heightened risks of attacks compared to the number of risks faced previously. The risks are higher in the case of the internet since the rising numbers of online transactions have created a bigger incentive for criminals as they can get more money (Wheeler, 2011). Additionally, companies that seek to mine data including information on customers and their transactions, outcome s of the launch of products and other information concerning markets, have created valuable intellectual property that has become a favorable target thereby increasing risks. In the current business environment, companies are supposed to be as open as possible and people who work in business units continue to demand for greater access to corporate networks using the mobile devices they usually use for their personal activities. Even though smartphones and tablets have been integral to increasing connectivity, they have also presented newer threats to information security since when a mobile device is hacked; it provides an easy gateway
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.