Entry 13: How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

With the development of technology and its usage increasing, businesses are scrambling to put together an effective cyber policy and infrastructure to make sure that their information keeps its integrity. Crimes that are committed, at least in earlier years, were done person to person. There is this “short arm” of predictive knowledge because the government is struggling trying to keep up with these “new” cyber crimes that are being committed. The predictive knowledge isn’t there or accessible as much as a normal crime because predicting what can be done over the internet rarely stays the same. As updates to systems and patches are made new ways are found to infiltrate a system. Many businesses want to get the integrity of the information they are given to their customers and customers want to be able to trust that these businesses are keeping their personal information secure. How do these businesses go about developing a policy to keep the information given protected?
Although there is no set solution on how to predict when the next cyber related attack is going to occur. Having a cyber policy and infrastructure is critical to negating attacks. Companies should have one created and that is enforced on a regular basis. The biggest threat to a computer is the user. Training and educational procedures should take place regularly or semiannually to make sure that the first point of contact is using systems properly. Information technology and cyber security teams should be readily available in workplaces to constantly monitor systems and respond to problems as they arise or even answer questions from users about unusual activity they are seeing. Additionally, this team can ensure that systems are being updated regular basis. They can even serve as ethical hackers to find vulnerabilities in a system. Computers and systems should have firewalls, intrusion detection systems, and malware prevention software to help prevent information from being exploited.

Leave a Reply

Your email address will not be published. Required fields are marked *