There are bad guys such as scammers or simply attackers out there who works around the clock and any information they get access to can be opened to all sorts of things which can be harmful to the company or agency. cyber-attack increases every day which is why it is very necessary for companies to come together to review the cyber policies from time to time. It helps seal all the gaps that are out there in cyber security. They need to examine the infrastructure and policies that are available today and ways that can help them. Having discussions such as password complexity, and data loss mitigations which when talked about can get lot of companies out of danger or reduce the risk of them getting hacked. It simply prepares them for anything. Risk assessment also plays a very important role when creating policies and infrastructures. Since most companies have no clue about when certain attack will be occurring, getting ready and learning from mistakes which leads to attack is the best thing that can be done to fight attacks strongly or hit back with a very strong force. Companies need to think about how important it is to keep a client’s information safe. Companies should also be fined when their carelessness leads to an attack because such risk leads to putting people’s lives at risk. Example of this can be when a company gets hacked, customers information such as social security can be accessed by the hackers which can be very dangerous. If there are penalties associated with punishing careless acts relating to computer carelessness, companies will be more attentive and change for the better.
In conclusion, it is very hard to establish a policy for a field that is difficult to deal with due to unfortunate threats which will never go away and on top of that, a policy that changes every day and not knowing how and when the attack is going to occur.
Work cited ‘
“Cyse-200 Reading Monitor – s2022.Xlsx.” Google Sheets, Google, https://docs.google.com/spreadsheets/d/1wDLs6ukAmOEJJZGnBOkSvMvVOywWJ78S/edit#gid=1118310381&range=F39.
Ntt. “The Impact of Digital Transformation on Operational Technology.” NTT, NTT, 28 Feb. 2022, https://services.global.ntt/en-us/insights/blog/the-impact-of-digital-transformation-on-operational-technology?utm_source=PPC&utm_medium=Paid&utm_campaign=ConnectedIndustries&utm_content=US_SecureOTBlog_LP&campaignID=7018d000000krtAAAQ&gclid=EAIaIQobChMIgYfN29GN9wIVmWpvBB1IXgzUEAAYASAAEgJ3UfD_BwE.
https://www.bloglines.com/article/what-is-network-security?utm_content=params%3Ao%3D740010%26ad%3DdirN%26qo%3DserpIndex