DescriptionReply to Cybersecurity and Risk Management Discussion 1 Q – Please read the discussion below and prepare a Reply to this discussion

Description

Reply to Cybersecurity and Risk Management
Discussion 1
Q – Please read the discussion below and prepare a Reply to this discussion post with
comments that further and advance the discussion topic.
Please provide the references you used.
Ensure zero plagiarism.
Word limit: 200 words
Discussion
Cybersecurity and Risk Management
Cybersecurity refers to the discipline dedicated to protecting information and systems that are used
to store it from unauthorized access, attacks, or damage by cybercriminals. Today, cyberspace is
witnessing increased cybercrimes from malicious individuals. These cybercrimes pose a significant
risk to businesses because they can lead to data breaches and losses (Turban, Pollard & Wood,
2018). Therefore, managers are taking caution by establishing strong cybersecurity programs for
their businesses.
The current state of cybercrime
Currently, cybercrime has been on the rise. According to Monteith et al. (2021), cybercrime has
increased since the covid-19 pandemic. It is estimated that about 800,000 cybercrime incidents are
reported every year because there is increased use of technology in the world (Monteith et al.,
2021). As a result, criminals take advantage of the current situation to hack, steal information, and
compromise the systems of internet users. Some companies like Yahoo experienced serious security
breaches to the point of being given the medal of the worst cyber hacks in history (Turban, Pollard &
Wood, 2018). In the US alone, 1093 data breach incidences were reported in 2016, which was a 40%
increase from the previous year (Turban, Pollard & Wood, 2018). Even big technology companies like
Microsoft and Google have experienced cyber attacks in the past, implying that no one is immune to
cybercrime.
How this cybercrime current state concerns me as a business manager
As a business leader, one ought to be concerned with the current cybercrime state. The manager is
responsible for the cybersecurity of the business (Turban, Pollard & Wood, 2018). Therefore, with
the increase in cybercrimes, the managers have a reason to be worried because the blame is on
them for not establishing a strong cybersecurity system to keep attackers at bay. Although managers
may not be tech-savvy, they make decisions regarding the organization’s security. As a result, it is
upon the manager to assemble a team of experts and provide the resources that will protect the
organization’s digital assets and systems.
Importance of frameworks, standards, and models to a manager’s cybersecurity program
Standards, frameworks, and models are crucial for cybersecurity defense. For instance, frameworks
like the enterprise risk management and the COBIT 2019 frameworks help the organization manage
cyber risks and govern the IT infrastructure. On the other hand, industry standards are established to
provide security to customers by preventing cybercrimes. A good example is the Payment Card
Industry Data Security Standard (PCI DSS) used by credit card companies to ensure the security of
users’ data. There are also models like the defense-in-depth model that managers use to provide
multi-layered security for their IT systems and prevent the likelihood of breaches when attacked.
Can frameworks, standards, and models keep an organization safe?
Yes, the frameworks, standards, and models can help in keeping the organization safe from cyberattacks and threats. They help control access to the IT systems, keeping unauthorized users at bay.
Additionally, they increase the level of security in the systems, minimizing data loss and damage to
the IT assets in the event of cyber attacks. Therefore, any organization that wants to keep itself safe
should consider implementing the frameworks, industry standards, and models in their
cybersecurity programs.
In conclusion, cybercrime is on the rise and this is a concern for business managers because they are
responsible for the cybersecurity of their businesses. Businesses are expected to have frameworks,
standards, and models that can help keep their information systems secure. Therefore, managers
who want to improve their cybersecurity systems should adopt the right frameworks, establish the
appropriate standards, and design models that will provide multi-layered security.
References
Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing
cybercrime since the pandemic: Concerns for psychiatry. Current Psychiatry Reports, 23, 1-9.
Turban, E., Pollard, C., & Wood, G. (2018). Information technology for management: On-demand
strategies for performance, growth and sustainability. John Wiley & Sons.

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Description

Description HALAH JAMALULDINE Module 14 Collapse Change management is a critical process in healthcare organizations, particularly in Saudi Arabia, where the healthcare system is undergoing rapid transformation to align with Vision 2030. One notable change in a Saudi healthcare organization was the implementation of electronic health records (EHRs) in a

Description

Description Module 14: Rewarding through Performance Management Effective Reward Systems in Performance Management Performance management systems and reward systems are essential components of motivating and driving individual and group performance in organizations. Analyze reward systems and the appropriate application to meet organizational goals. Discuss the different types of reward systems,

Description

Description Reply to discussion (Module 14: Rewarding through Performance Management) Q – Please read the discussion Attached and prepare a Reply to this discussion post with comments that further and advance the discussion topic. The reply needs to be substantial and constructive in nature. it should add to the content

Description

Description Reply to discussion (Module 14: Rewarding through Performance Management) Q – Please read the discussion Attached and prepare a Reply to this discussion post with comments that further and advance the discussion topic. The reply needs to be substantial and constructive in nature. it should add to the content

Description

Description Author(s) Year Study Name Study Type Amponin & Britiller 2023 Electronic health records (EHRs): effectiveness to health care outcomes and challenges of health practitioners in Saudi Arabia empirical, descriptive, and cross-sectional study Alfaleh et al. 2022 The role of telemedicine services in changing users’ intentions for presenting to the

Description

Description Hello, the task is to write a discussion and Quiz for module 14 from MKT640 course

Description

Description I want assistance with my internship report. will give details later 👍🏼 You may use AI to save time, as long as it gives accurate description, I don’t mind it =) College of Administration and Finance Sciences Form No 4- Internship Report Cover Page Student`s name: Student`s ID #:

Description

Description See College of Health Sciences Department of Public Health HCM101-PAPER ASSIGNMENT Course name: Healthcare Management Course number: HCM101 CRN The textbook (Buchbinder & Shanks (2012), second edition, chapter 5) addresses an essential topic in health care, which is strategic planning. SWOT analysis is a significant tool that healthcare leaders

Description

Description Consumer Behavior Case Study: Nike and Maslow’s Hierarchy of Needs Introduction Nike is a global leader in athletic apparel and footwear. Its success can be partly explained by how it meets different levels of consumer needs based on Maslow’s Hierarchy of Needs, which include: 1.Physiological, 2.Safety, 3.Social, 4.Esteem, and

Description

Description Dis. one file. Discuss in detail the process that a researcher hypothetically would go through when they become aware of a population health problem that arises during the Hajj. What research would be needed to protect the population of the Kingdom? reply. Hi Sarah, Great discussion! I agree that

Description

Description The organizational behavior aspects (motivation – attuited – personality – emotion ..etc. ) helps the manger to understand their employees in the work environment In two essays answer the following questions: 1.How those aspects will be effect in the work performance and employee satisfaction? (5 grades) 2.What are some

Description

Description see College of Computing and Informatics Assignment 2 Deadline: Sunday 13/04/2025 @ 23:59 [Total Mark for this Assignment is 8] Student Details: Name: ### ID: ### CRN: ### Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard

Description

Description I need help completing a discussion board post for my Management course (Managing Perform. for Results). Below are the exact requirements provided by my instructor: Description: In this module, you will examine how pay and reward structures support and facilitate performance management. You will also compare traditional and contingent

Description

Description Module 14: Discussion ForumModule 14: Dis one One file. Discussion Forum Think about a change you know of in a healthcare organization in Saudi Arabia. How was the change received and what was the outcome? What were the resistance points? Provide and discuss suggestions to deal with resistance to

Description

Description Academic Report Guideline(Co-op) (please do not include this text in the final report, just follow its guidelines and use the cover page above) The report should be submitted within two weeks after you finish your Co-op training Program. In addition, the report should be approximately 3000 – 4000, single

Description

Description hi the work you have done is great i need the PPT too Course Name: Student’s Name: Course Code: Student’s ID Number: Semester: CRN: 25492 Academic Year: 144 /144 H For Instructor’s Use only Instructor’s Name: Dr. Faisal Alhathal Students’ Grade: Level of Marks: Secondary address separator Secondary address

Description

Description Release Date: Sunday, February 16, 2025 Due Date: Sunday, March 16, 2025 (11:59 pm) Instructions for submission: Assignment must be submitted with properly filled cover sheet (Name, ID, CRN, Submission date) in word document, Pdf is not accepted. Word count between 500 to 600 Text size 12-Times New Roman

Description

Description Academic Report Guideline(Co-op) (please do not include this text in the final report, just follow its guidelines and use the cover page above) The report should be submitted within two weeks after you finish your Co-op training Program. In addition, the report should be approximately 3000 – 4000, single