internet to take precautionary measures to protectinternet to take precautionary measures to protect

internet revolutionized how people
interacted, institutions operated, exchanged or stored information. Vital and
confidential information requires to be stored for access by any authorized
persons and this emphasizes why the need for cybersecurity is on the rise.  Cybersecurity comprises of processes,
technologies, and controls designed to protect networks, systems, and data from
a cyber-attack (Lehto, 2013). The costs that come with a cyber-attack
are numerous ranging from company reputation to financial losses and this emphasizes
the need for cybersecurity measure. Therefore, many firms are increasingly
sourcing for information security, application security, network security and
data recovery.

According to Veta Richardson who is the
Chief Executive Officer of the Association of Corporate Counsel, the
ever-growing complex dimensions of digital security, strong moral capabilities
of the leadership team, realistic policies and reliable communication stand out
as key elements towards curbing cybersecurity threats. The amount of
information that is shared over the internet is overwhelming and this emphasizes
the sensitivity of the security systems. Numerous hackers have realized that they
can hack for economic gains and this has motivated them to infiltrate major organizations
and steal important data and personal information. The digital exchange of
information drives the emerging digital era that is key towards sustaining the
economy but it is equally dangerous when it gets into the hands of unauthorized
personnel. Therefore, cybersecurity can be advocated for institutions that
store and transfer large amounts of data such as banking institutions and
online email services or social accounts. This is because all organizations
have an ethical responsibility to safeguard customer information and to take
precautionary measures to protect the sensitive information they are entrusted with.
The need for organization offers the business an opportunity to solve an
existing threat through providing cyber security to help eliminate the threat
of losing sensitive information.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Ethical Obligation

Training employees on the importance of
cybersecurity is important since it enables them to take different
precautionary measures to avoid creating loopholes that are often exploited to
breach security.  The cybersecurity
company through the implementation and integration process can help the organization
develop a strong culture of compliance and ethics that emphasizes data
protection and cybersecurity (Richardson, 2018). 
Therefore, the growing need for security needs to create a platform that
allows the board members and the management to receive regular reports
consisting of the company’s efforts and measures towards any looming
cyber-attacks. The realization by employees that developing a shared
responsibility that it is invaluable towards protecting data from cyber-threats
is important. The cybersecurity organizations need to realize that the
installation of cybersecurity measures and systems does not guarantee absolute
protections especially if the employees are unaware of how to maximize their

Employee breach is the leading cause of
cybersecurity breaches in organizations and companies need to cautions their
employees on how to mitigate the exposure to cyber threats.  According to a study conducted in 30
countries, more than 1,000 in-house counsel affirmed that errors from employees
caused the majority of data breaches across different industries (Richardson, 2018).
This is more pronounced compared to cases of email phishing and hacking that
people often consider being the biggest threat to confidential company
information. Therefore, training employees are inevitable to help eliminate
misstep errors, leaving sessions unlocked and verifying emails before sending
sensitive information. The different organization needs to be increasingly
accountable and employees as well to ensure that minimal employee error exposes
the organization to cybersecurity threats that keep changing every day.

Best Practice based on

Access restriction through passwords and
access codes form the first line of data protection within an organization (Steen, 2018).
The passwords and access codes also help in tracking down the account that was
used to leak certain information from the organization without authorization.  However, the storage of information on the
cloud is risky since existing antivirus software only protects the information
from older malware. This leaves the option to create several entry levels to
access sensitive data as well as limiting certain authorization to senior
management especially for sensitive data. Additionally, the realization that
different organizations require different security measures is important
because the size and nature of information held by an organization determine
the cybersecurity measures to be implemented (Amoroso, 2007). However, this
can only be realized through engaging an experienced and qualified team of
experts to determine the preferred security measures that suit an organization.
Therefore, the measures would help in having security measures that control the
input parameter validation, user authentication, parameter manipulation,
session management and auditing or logging information.  This is only possible if organizations realize
that cooperation with the cybersecurity teams enhances the level of security
through processes, technologies, and controls designed to protect networks,
systems, and data from a cyber-attack.


Cybersecurity keeps evolving and the
different dimensions of attack require organizations to update their security
system and programs more often.  Enabling
organizations to understand this is important since it would help them explore avenues
to do so by relying on the assistance of professional cybersecurity
specialists. Additionally, raising awareness to the management of different
organizations would ensure that employees are trained and retrained often to
ensure that they are equipped with recent measures to reduce cases of
cybersecurity breaches because employees are the leading cause of cyber
security attacks across different industries.