logo

Cybersecurity Issues in JL Company

   

Added on  2023-04-11

15 Pages2532 Words124 Views
 | 
 | 
 | 
Assignment
Issues to be addressed in JL company
Cybersecurity Issues in JL Company_1

INTRODUCTION
For any organization hoping to make a fruitful computerized change, cybersecurity must be a top
need—hard stop. Harms and information misfortune identified with cybercrime has now raised to at
no other time seen extents, and reports recommend the unsafe impacts of cybercrime will before
long cause a yearly expense of around $6 trillion by 2021(Peng, Li, & Fei, 2017). Therefore, it has
turned out to be progressively significant for associations to make adequate strides in ensuring their
frameworks and the information they hold, including their hierarchical just as close to home client
information. Organizations of all size must keep up a sharp familiarity with how cybersecurity is
changing, how it tends to be connected, and in particular how it very well may be undermined in the
event that they would like to end up as the winner(Yuan, Yuan, Guo, Yang, & Sun, 2016).
Issues Reason
1 No security software in all laptops Vulnerable to cyber attack
2 Internet is via wireless router Exposed to network attack through wireless router
since it is old and weak
3 No policy in back-up Leads to loss of data and money
4 Windows 2000 – power surge It leads to loss of data and not available all the time.
It can affect other devices in JL company.
5 Spam messages Delivering of malware through spam messages in
email
6 No policy about the use of resources All users can access all the resources in JL company
network which makes it vulnerable for an attack
7 No cryptographic techniques An attacker can access the data via the Internet and
misuses the data for profit gain
8 Found USB with malware Lack of basic training to employees to avoid
affecting the JL company with malware
Cybersecurity Issues in JL Company_2

Fig 1(Yuan, Yuan, Guo, Yang, & Sun, 2016)
Why JL company should address Cybersecurity issues
1. Number and intensity of cyber attacks are increasing
In parallel to the developing number of Internet clients and online business exchanges, number and
force of digital assaults have expanded too. There is no dependable, far-reaching information.
Nonetheless, information from studies affirms this announcement.
2. Customer trust is based on the integrity of their data
Each business is based on the trust of its clients. On account of business done through the Internet,
this trust is fundamentally based on the trustworthiness of client information and how well this
Cybersecurity Issues in JL Company_3

information is ensured by organizations.
3. Cybersecurity is more than a task for the IT department
In various organizations, cybersecurity is dealt with primarily as an assignment for the IT office.
Through specialized measures, IT experts are relied upon to guarantee that the computerized
business of their organizations is shielded from digital assaults.
4. Employees could either be a security risk or an asset
Cybersecurity is as much an issue of the workforce as it is an IT subject. Numerous cybersecurity
dangers are made or expanded by scatterbrained workers. Assume for instance the loss of cell
phones, which establishes a noteworthy security chance, as information found on those gadgets
could give access to delicate organization information.
Issues to be addressed in JL company
a) Implement Secure Communication Methods.
Here's a tip that may astonish you: Did you realize that fax is the most secure type of
correspondence in the business world? (Ding, Li, Quevedo, Dey, & Shi, 2017).
"At the point when a record is sent by fax it's changed over into paired code (0s), sent via phone
system and after that reassembled at the opposite end," says Karol Waldron of XMedius, a pioneer
in big business grade fax arrangements. "Hacking into the phone system would require direct
manual access to the phone line, and regardless of whether a record was caught it would introduce
itself as the only clamor, making it for all intents and purposes difficult to translate/read."
Notwithstanding utilizing fax, you ought to likewise survey your organization's way to deal with
versatile correspondences. On the off chance that your staff utilizes cell phones for work purposes,
Cybersecurity Issues in JL Company_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures
|5
|1404
|493

Cybersecurity Issues at JK Company
|11
|3067
|80

Digital Forensic Fundamentals: Roles, Responsibilities, Hardware and Software
|20
|3723
|154

Cybersecurity and its Importance to ABCT
|5
|959
|422