Saturday, May 2, 2015

Identifying Threats in a business organization

     Threat is an agent that may want to or definitely can result in harm to the target organization. They are potentials for vulnerabilities to turn into attacks on computer systems, networks, and more. Threats can put individuals’ computer systems and business computers at risk, so vulnerabilities have to be fixed so that attackers cannot infiltrate the system and cause damage. It becomes important task for organization to identify the threats have potential to cause serious damage and can lead to attacks on computer systems.

     Threats can come in the form of spyware, malware, adware, software attacks, human errors, internal and external data thefts and so on. The organization needs to watch for the attackers sifting through log data to identify actual attack patterns which can give them a good idea of the types of attacks. The information security awareness training for the employees is always a good step to start with. Once the employees have good ideas and knowledge and what can be considered as the threats, they will think twice before opening emails from an unidentified source or plugging in an external device to the work PC. Organizations which give access to various social networking sites for its employees without any restrictions need to understand the risks that are out there, and make sure the proper controls are in place.

It is clear that we cannot gain a security suite that will give us 100%protection, but we need to minimize the risk waiting at our doorway. In order to do that we need to use a score mechanism that will help us make the right decision.

     Forces of nature in the form of earthquake, flood, fire, lightning can be considered threats as well. Hardware can fail and this can result in loss of data and revenue. Viruses, worms, spyware, malware, adware can always harm the PC and provide aid towards stealing valuable information for the intruders, hence, running antivirus software and security scan on regular basis is always recommended. Organization should also prepare from the inside threats which can come from the internal staffs as well. Access controls and proper transactions logging in place can play key role here by configuring the system on who can have access to the data and keeping track of which transaction was occurred at what time and by whom.

References:

Kartz, Or (2012). Identify the Most Probable Threats to an Organization. Retrieved from https://devcentral.f5.com/articles/identify-the-most-probable-threats-to-an-organization

Techpedia, (n.d.). Threat. Retrieved from http://www.techopedia.com/definition/25263/threat

1 comment:

  1. NFT Gaming

    Top 5 NFT Gaming Platforms That Are Going Rule In 2022

    The NFT gaming platform development is trending at a very high rate. Check out the top 5 NFT gaming platforms that are going to rule 2022.

    #NFT #NFTGaming #NFTGamingPlatform #TopNFTGamingPlatforms #NFTgames #NFTGameDevelopment #NFTGamingPlatformDevelopment #AxieInfinity #GuildOfGuardians #GalaxyFightClub #CryptoBeasts #Illuvium #NFTGameDevelopmentCompany #NFTGamingMarketplace

    ReplyDelete