Journal #13

I believe that the best way to approach cyber policy development is to imagine your organization as a football team, with your company as the quarterback. As a result, you’ll need a strong defense to protect the quarterback from the opposing team’s sack attempts. This, in my opinion, is the best way to approach cyber policy development. The short arm of human power did not necessitate an extended arm of predictive knowledge; the shortness of one is as much to blame as the shortness of the other.

Formulating a cyber security policy for your company, particularly if you have employees working for you is essential. It is beneficial for your staff to understand their role in securing the company’s information and technological assets. When you are developing your policy, you should make sure that it provides direction to your employees regarding the following topics: the types of information they are permitted to discuss and the locations at which they may do so; the types of devices that may be used on the job; and, finally, the proper handling of sensitive information and storage material. Consider some of the measures listed below while building your company’s cyber security policy. Set password requirements, set up firewalls to protect email, educate employees to identify phishing emails, and deal with sensitive data stored with your company.

The duty of ensuring that cyber policy is kept up to date is inextricably linked with the existence of cyber infrastructure. The term “cyber infrastructure” refers to the network that links computer systems and data stores using the internet as the connecting medium. To ensure the continued health of economic, public health, safety, and welfare systems, it is imperative that an up-to-date and secure infrastructure be maintained. When a nation’s physical infrastructure is threatened, the overall health of the nation is also put in jeopardy. It will be difficult for citizens to maintain their standard of living if the infrastructure is not secure. When problems are found in the infrastructure of society, it is essential to try to create a more secure future system and patch the holes that have been found in the infrastructure.

Leave a Reply

Your email address will not be published. Required fields are marked *