logo

Business Continuity Plan (BCP)

   

Added on  2023-01-17

5 Pages1012 Words61 Views
BUSINESS CONTINUITY PLAN
(BCP)

With the invention of digital technology, there is an incredible increase in the demand
of professionals of IT security. Companies have identified the idea of cyber-security and will
have to invest in certain resources that can protect the organisation`s data and personal
information. The size of security team differs from organisation to organisation and industry
to industry. For example- e-commerce companies needs high degree of domain. In order to
handle the incidents especially when information security is an issue for a business
(Sahebjamnia, Torabi, & Mansouri, 2015).
It is important to resolve these issues as the recovery of data has little impact on
business operations. With the increase in issues related to information security are
ransomware (a malicious software that threatens the private data), botnets, crptocurrency
hijacking, computer viruses, and worms. It involves using of complicated strong network for
compromised machines. Botnets involve large-scale attacks that can hack millions of
unwilling computers and systems. Computer viruses and worms were born since the birth of
internet as they have destructive power. They have become more problematic as they deploy
in files data files such as excel sheets, document, and spreadsheets. Moreover, in 2019,
security issues will prevail on high notes, high scale, but new technologies and exploitation
will improve the mobile security risks. It is important for the company to conduct training
sessions for low-level management so that they can access to antiviruses and protect the data
(McCarthy, & Gordon, 2016).
With the ramified economic changes, there is a need to prepare a strong business
continuous plan where CISO is the designation in security domain. Although, this position is
not mandatory in in each organisation. This position is for senior-most security personnel but
possess huge team under him such as senior manager, CXO reporting level, technical
managers, security program manager, and security analysts such as Anti-virus, VAPT,

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Importance of Cyber Security in Protecting Against Cyber Attacks
|26
|8270
|85

Application of Risk Mitigation and Planning Tools
|3
|830
|42

Assessing Security Risks to Organisation
|21
|5004
|59

Disaster Recovery Poster Assignment 2022
|1
|978
|43

Assignment | Cyber Security
|23
|2174
|14

Cyber security Assignment PDF
|9
|1468
|145