ePortfolio Entry #1

Cybersecurity and Communications are mutually supportive business areas when implemented and integrated thoughtfully and deliberately by a firm in order to protect information in the digital age. Communications, when practiced well, allows a firm to manage perception and stakeholder opinion by providing greater context and justification for the firm’s business decisions, policy actions, financial results and legal issues. Cybersecurity, when practiced well, allows a firm to protect its unique and strategic advantages including but not limited to financial, customer, employee, vendor, product development, and intellectual property.  Good cybersecurity allows a firm to protectively use its communication to its advantage. Cybersecurity protects what is happening within the firm in order that the public only becomes aware of it when the firm is ready to publicly communicate it in the way it wants when it wants. A lack of cyber security will enable hackers to penetrate and violate the IT systems of a firm in order to gather and publicize information that will potentially harm the firm and allow information to fall into the wrong hands. Strong cyber security ensures the firm shares this information when it is ready. On the other hand, in the event a firm has poor cybersecurity and its systems are penetrated by malicious outsiders, strong communications will help the firm share the events with the public in the best possible way in order to minimize harm in regards of reputation as well as be as helpful as possible to those entities outside the hacked firm whose information has been stolen. For example, my mother and father work at Newport News Shipbuilding.  Newport News Shipbuilding has sensitive Department of Defense data stored on company servers. Cybersecurity is paramount there. Any breach of NNS’s IT systems has the potential to jeopardize national security. Communication theory is used through these large corporations to increase their public relations for the better and cyber security helps to place a veil between sensitive information that could also damage their P.R.

Leave a Reply

Your email address will not be published. Required fields are marked *