{"id":289,"date":"2021-03-13T22:11:39","date_gmt":"2021-03-13T22:11:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gwils006\/?p=289"},"modified":"2021-03-13T22:11:40","modified_gmt":"2021-03-13T22:11:40","slug":"eportfolio-entry-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gwils006\/2021\/03\/13\/eportfolio-entry-7\/","title":{"rendered":"ePortfolio entry #7"},"content":{"rendered":"\n<p>A cyber security program includes two main costs. The costs associated with the actual implementation monetarily speaking and the cost of not implementing a cybersecurity program. We will focus on the later because the monetary cost of not implementing vs. implementing vastly exceeds the implementation. Costs of not having a program in place include loss of data, theft of intellectual property, possible business closure, normal operations halted, revenue loss, trust from customers, and time to name a few of the costs associated with not having a cybersecurity program. All these losses equate to a business\u2019s bottom line in the end. The program doesn\u2019t have to be expensive. Of course, this is relative considering the size of the business. The NIST cybersecurity framework provides an adaptive\/scalable tool to business who want guidelines on implementing a cybersecurity program.<\/p>\n\n\n\n<p>The benefits of a cybersecurity program outweigh the costs of not having a cybersecurity program. Businesses who implement a cybersecurity program show good business skills, management, and future thinking. Consumers need to know that when they patronize a business, their information will be safe. Having a good cybersecurity program can help build this trust between business and consumer. Trust is foundational to building a successful business. The program has other benefits not directly related to money but lead to money. Morale, safety, self-worth, self-actualization, and peace of mind are all attributes of a good cybersecurity program in terms of the employee. If your employees have their needs meet in a work environment, they will in turn increase the overall success of the business. Companies with a good cybersecurity program will be able to respond when an event happens, because as part of a program is the training aspect. They train for events that might happen and figure out how to mitigate the loss of eventual cyberattacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cyber security program includes two main costs. The costs associated with the actual implementation monetarily speaking and the cost of not implementing a cybersecurity program. We will focus on the later because the monetary cost of not implementing vs. implementing vastly exceeds the implementation. Costs of not having a program in place include loss&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gwils006\/2021\/03\/13\/eportfolio-entry-7\/\">Read More<\/a><\/div>\n","protected":false},"author":19580,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/posts\/289"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/users\/19580"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/comments?post=289"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/posts\/289\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/posts\/289\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/media?parent=289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/categories?post=289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gwils006\/wp-json\/wp\/v2\/tags?post=289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}