Journal 7

There are costs and benefits of developing cybersecurity programs in business. Oftentimes, the benefits of developing a cybersecurity program can be affordable for a company, especially in the long-term. Some benefits include a better reputation for the company, create additional career options for the company, and allow the employees to contribute their efforts for the company. A better reputation comes from the rapid response of the team and coordination with the social media team to notify the customers of a breach. Also, the inclusion of the program can allow the company to warn hackers that it is anticipating a breach and deter people from targeting the company. The creation of the programs can allow the company to hire more roles for the programs and expand the company’s workforce. Moreover, new roles are sprouting from the growth of cybersecurity, allowing applicants to decide where they want to situate themselves. The programs can encourage collaboration with the employees who do not work in a technical department because the employees can report suspicious activity and monitor their accounts for signs of an intrusion. In a way, the employees are learning practical advice for staying safe on the internet and they do not have to spend money for the information. On the other hand, the costs of a cybersecurity program can be high, depending on the needs of a company. Companies can overspend their budget for cybersecurity counseling, pay additional costs, and choose to outsource their needs. When companies spend more than they have for cybersecurity programs, they can risk the integrity of their company by obtaining debt and neglect to give a proper salary to the employees. In the event of a breach, the company might need to pay costs to repair and upgrade their infrastructure to get back online. By outsourcing their cybersecurity programs, the third-party contractor may not fully understand the needs of the company and can be an entryway for a hacker to penetrate the defenses of the company if that outsider’s security becomes compromised by a vulnerability.

Leave a Reply

Your email address will not be published. Required fields are marked *