logo

Sources of Organization Data Breach and Risk Management Approach

   

Added on  2023-06-07

4 Pages780 Words223 Views
 | 
 | 
 | 
Running Head: ORGANIZATION DATA BREACH 1
ORGANIZATION DATA BREACH
Student Name
Institution Affiliation
Facilitator
Course
Date
Sources of Organization Data Breach and Risk Management Approach_1

ORGANIZATION DATA BREACH 2
According to the five potential sources of risk which were listed by Dube and Bernier in
their paper “Risk Management Approach for IT solutions” each deserves attention because the
various security breaches which have been reported in the past have indicated different sources
of breaches. For instance, EnerVest and Sage companies had their data breach through their
untrustworthy employees while Equifax and WannaCry had their experience through hacking.
Considering these few cases and others is a clear indication that data breach can originate from
different angles and therefore business organizations should be equipped all the time (Krebs,
2013).
Employees are among the major sources of breach which any business should count
among the top potential risk. This is in consideration to the fact that organization employees are
all aware of the operational process of any organization systems and can easily compromise with
the data in partnership with external parties (Picanso, 2006). For instance, some of organization
employees are aware of server passwords either legally or illegally and therefore if they intend to
share with attackers can do so leading to serious data breach incidences for an organization. A
case example can be observed in the EnerVest Company which faced its data breach calamity
through one of its employees who was revenging because of job termination in the company.
Business partners who are sometimes considered as colleagues in the business
environment may also act as a data breach threat to an organization (Romanosky, Hoffman &
Acquisti, 2014). Although not a very common incidences, in the process of interaction between
the company staff at their basic level, they may come across information system passwords and
which can be used to access the organization databases and other critical components of the
organization information system which may reveal crucial data (Romanosky, Hoffman &
Sources of Organization Data Breach and Risk Management Approach_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Management in Cloud Data Security: Overview, Preventions, and Lessons Learnt from Uber Data Breach
|24
|1401
|303

Data Breach
|4
|786
|33

Data Breach Legislative efforts taken by Australian NDB Case Study 2022
|12
|2758
|51

Information Security Risk Assessment : Importance
|6
|1427
|16

Data Breach is a Huge Concern for Cyber Security Experts
|8
|1551
|459

JP Morgan Data Breach
|5
|722
|96