Journal 7: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

The first thing that arises in mind to secure the company’s data to ensure its assets because today’s data is money, so you have to keep it insecure to avoid any measurable problem.
Whether it is a small one or a big one, every organization must follow strong security policies and avoid the many types of breaches and threats. When the company starts, they do not track or not try to prepare themselves for security reasons. When it is on the starting period, many firms mainly focus on the business model and generate revenue. This business model is good, but it is also responsible for focusing on security policy.
So the company can follow this rule to avoid many types of situations and follow the security policy are.
1) company must think security is also important and essential part of the organization.
2) company must have aware of the types of losses that can be faced after the breach.
3) they must have to hire experts to prevent the security of the company.
4) must set up a good security policy and infrastructure to avoid the many types of vulnerabilities.
5) the company have to learn from others mistake and secure them firmly.
Overall, it isn’t easy to develop policies for a constantly changing field over the years and not exactly knowing what is to come until it has already happened. There are certainly several things that should be kept in mind when implementing such policies and infrastructure. Every company today needs to consider cyber policies as attacks occur more often and are very costly today. Preparing for everything is the best you can do and then learn from an attack after it has happened. The costs for these attacks and breaches continue to rise through the roof year after year, so that would certainly be another reason to have policies in place to try to solve the problems.

REFERENCE:

  1. Cybersecurity Policy Making at a Turning Point. (2012). OECD Digital Economy Papers. https://doi.org/10.1787/5k8zq92vdgtl-en
  2. Moore, M. (2017). Cybersecurity Breaches and Issues Surrounding Online Threat Protection. Advances in Information Security, Privacy, and Ethics, 24. https://doi.org/10.4018/978-1-5225-1941-6
  3. Policy Development for your Security Program. TrustedSec. (2019, September 16). https://www.trustedsec.com/services/cybersecurity-policy-development/.