![]() ![]() An employee’s personal computer may contain a master list of access codes for the company’s servers. Unfortunately, this can be a major drawback in that the devices being used by the company’s employees may also be a target for hackers. In fact, its business model is dependent on these technologies so much that the company would cease to exist and make profits without them. Pea Pod relies heavily on the use of internet and other wireless technologies. Apart from these programs, the installation and activation of firewalls would also be necessary. It is important to note that the installation of such programs on all computers being used by the company should be mandated because even a single computer that is connected to the organization’s network that does not have the necessary protection against the malicious codes can compromise the security of all the other computers connected in the network. For commercial entities like Pea Pod, they can easily avail of a business or enterprise package from top-selling anti-virus software vendors like Kaspersky, Norton, and Symantec. Malicious codes can be easily detected by anti-virus and anti-malware programs. These can mean a lot of things for a company that does not have the firepower and resources to ward off the most complex and sophisticated used by attackers who target large scale multinational corporations. By implementing a comprehensive security policy addressing these top five threats, Pea Pod and other small businesses can potentially ward off some 82% of the existing security threats. Security Policyįive of the most common threats for businesses that operate online such as Pea Pod are the following: Malicious Codes, The Use of Portable Devices, Spear Phishing, Unsecured Wireless Networks, and Insider Threats. That is, compared to bigger companies, they have limited resources to successfully security threats. This is so far one of the possible risks to the company’s security system. In fact, it makes much more sense for smaller companies like Pea Pod to be targeted because they have little to no resources and technical knowledge how to successfully screen al possible cyber security threats. ![]() The reality is that startup companies like Pea Pod are also being targeted. While those reports are valid, this creates the notion that only large scale multinational corporations are the ones being targeted by hackers and other malicious entities. Evidently, their previous budgets were not enough to ward off the most recent attacks. In the case of Sony, one of the latest victims of cyber security breaches, their latest announcement suggests that they are investing $15 Million for a more formidable cyber security defense. It is surprising and frightening at the same time that even those corporations are being targeted despite the fact that they are the ones that are very much capable of setting up formidable information system defenses against malicious entities. ![]() There have been a lot of documented events wherein large scale multinational corporations have been successfully victimized by cyber security and information system attacks. ![]()
0 Comments
Leave a Reply. |