Academic Master

Technology

Risks and Threats of Data Security

Success of the companies in today’s environment is mostly dependent on innovation, and appropriate data is its key component. But, companies which are based on data and running business on quality of data, have to uncover the vulnerability and data breach associated with it. For every company, it is important that they tend to focus on data security and privacy (Terzi, Terzi & Sagiroglu, 2015). Staying ahead of the criminal and illegal data activities, requires that the company should improve its security controls and data security activities.

Most of the companies nowadays do not cater the warnings for their cybersecurity or data security, and fail in standardizing the company’s privacy. According to studies, AT&T analyzed that 50% of the companies did not updated their data securities in the last three years (Terzi, Terzi & Sagiroglu, 2015). The protection and privacy of confidential information is gaining more interest as each year advances. A survey conducted by World Quality Report 2015-16, found that data security (cyber or any other) is the most important aspect for the companies to be measured. However, there are threats and risks of data security, which is imposed as a direct loss for the company if it is not managed accordingly. These risks and threats of data security as discussed below:

  • Non-existence of security architecture: Some of the organizations do not have any security architecture in the workplace, which leaves the company’s data to be exploited and loss of any indentifable information. This is sometimes caused by the lack or resources from the company, or unqualified IT staff which has to ensure the data protection (Rao & Selvamani, 2015). As a result, the networks of the employees are directly linked to the internet, without any privacy measures. This can become a threat when the data is transmitted to the internet without any firewall or protection layer. Inappropriate networking of data security can also result in vulnerability of data including the hardware and software, which can also include the threats of hacking and viruses. The structure of data security is mostly influenced by the IT staff and having the unskilled staff for the data protection becomes a threat, which becomes negative for the companies in their success (Rao & Selvamani, 2015).
  • Cyber crime: One of the most important threat to a company is the cyber crime. It usually arise as hacking into a computer/system of a company through internet. Due to lack of data protection on the internet, hackers get leverage to breach a company’s system and access private data (Rao & Selvamani, 2015). It also includes Trojan Horse and malware, which are the viruses on the internet to make a PC or the entire system of the company to become corrupted. This threat is increased when a company does not have measures to secure their data online and gives leverage to the cyber criminals.
  • Employee breach: Some of the threats of data protection comes from within the company. A threat from the employees always exist in the company, that they might impose a potential loss for the companies. Employee tend to breach the private data of the company, and it makes it easy for them when the data security measures are not appropriate (Lane, Shrestha, & Ali, 2017). These breaches are made easy when the company shares the secret passwords to confidential files and systems. Physical storages like Flash Drives, external storages and using the metadata from the internet to access the company’s private data is mostly accessible by the employees (Lane, Shrestha, & Ali, 2017). Threats of employees gathering data is mostly important to manage. Ultimately, it becomes a risk that whether or not, allow the employees to be flexible with the workplace or not.

Policies/procedures to mitigate these issues

  • First, the company should hire the experienced IT staff to ensure data protection. These IT indiviuals should know about the SQL and malware functions (Lane, Shrestha, & Ali, 2017). By hiring quality indiviuals, it will make the company more protective in terms of data security and improve the continuance of the business.
  • The cyber crime has increased a lot in the technological world. A number of techniques including proxy servers and firewalls are the means to create a more protective data systems. Cyber crimes such as hacking the data and feeding viruses to the systems, can be dealt by installing firewalls which are renewed everyday by the employees (Terzi, Terzi & Sagiroglu, 2015). Using proxy networks which disable the ability of hackers to intercept the company’s data.
  • The most important measure to consider is the employee breaching the confidentiality of the company. These issues can be resolved by utilizing the security solutions like hidden cameras in the workplace, and for home tasks, appropriate softwares can be allocated which monitors the PCs or the systems used for completing the tasks (Rao & Selvamani, 2015). If a situation arises that the employee want to copy the data from PC to his/her private flash drive, the company can resolve it by setting up passwords for the unknown devices whenever it is attached to the PC.

References

Lane, M., Shrestha, A., & Ali, O. (2017). Managing the risks of data security and privacy in the cloud: a shared responsibility between the cloud service provider and the client organisation.

Rao, R. V., & Selvamani, K. (2015). Data security challenges and its solutions in cloud computing. Procedia Computer Science48, 204-209.

Terzi, D. S., Terzi, R., & Sagiroglu, S. (2015, December). A survey on security and privacy issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 202-207). IEEE.

SEARCH

Top-right-side-AD-min
WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE

Pop-up Message