Cybersecurity Analytical Paper
(1)Has technology caused more damage than good over the years in the workplace and even in our personal lives? Over the years, I feel that technology has been helpful with our everyday lives and the way we interact now with each other since the recent changes in our world due to the coronavirus. Technology has also left myself and others in some situations being vulnerable to cyber attacks and hacking incidents. We can do everything on our computer from the comfort of our home such as work, do school work, and also shop. Not only has it affected our personal lives, but technology has also had an effect in the workplace, which results in business computers, and the company’s sensitive data being at risk if the proper cybersecurity training, systems, and policies are not put in place for difficult situations. Fortunately, there are policies and programs that can be in place when a malicious attack occurs to protect the employees and company by detecting the attack on sight before a ton of damage occurs.
(4)(7)(10)Having and developing cybersecurity programs in businesses is very important for an amplitude of reasons in the workplace.(5) One being to make sure the business knows the proper steps for different situations and being up to speed with the best techniques to keep them and their employees’ safe; while on the internet and using different information through different platforms and being aware of the possible risks that can be presented. Such as when being at work and looking at a site that is not work-related can open the door for the company computer to be hacked through the business’s network, which leads to the company passwords, files, and cameras at risk of being in the hands of an unauthorized party.(8) Having cybersecurity programs is a huge advantage and benefit for the business; others might argue that it can also be a costly investment into the business as well.(8) With costs varying for many different jobs and research being needed to make sure the cybersecurity programs are unique and fitting for different businesses and different needs and wants that each company might desire. The first step is having to hire a professional in the cyber security field to see what system would best fit the description of what the business needs are. This action will require some research about the company’s weaknesses and strengths to make sure the best program is set up to keep the business protected from any harm or malicious activity that could cause damage in the future. Then after the programs are designed for the company and the computer systems for the employees to use there has to be training so the employees know how the system runs. This can lead to more expenses having to hire a teacher to explain the details and instructions that are needed. Last but not least, keep the system up to date with the newest version available to make sure your PC is secure and running it’s best performance so bugs or viruses are not a concern. For example, when a new update comes out for your phone, you don’t have to get the update but it is recommended so the software is up to date and runs smoothly. There are bright sides to developing a cybersecurity program and more costly sides but both sides create a great investment into the business.
(6)(7)Even after the cybersecurity programs are put in place to keep the hackers and deviants out there can be deviance anywhere. It is easier to occur on the internet in the workplace rather than occurring face to face with other employees because when the action is done online the deviant believes it is hard for the action to be detected and punished. The definition of workplace deviance is “the deliberate desire to cause harm to an organization.” Deviant behavior usually occurs when the workers feel like a rule or agreement has been violated resulting in one of the coworkers feeling a certain type of way about the situation. Everybody has motives and has a breaking point or believes something different than other people when it comes to different situations such as people that have been working at jobs for over twenty years might believe they should be promoted to a manager or a CEO of a company while the actual bosses do not believe that is the right venture for the company at the time or ever. This can result in the employee having sour feelings about the company and the employers, which can lead to deviant behavior such as trying to sabotage the company and releasing sensitive data about the company. This action can set the company back and destroy the business if not corrected and caught immediately.(4) While this terrible situation can occur, if a cyber security technology practice is in place such as embedded hardware authentication, this whole situation can be avoided. The embedded device would protect the company from the malicious attack because of the mechanisms provided. Cyber technology helps a deviant outsmart the workplace when it comes to workplace deviance because it can be harder to catch the person causing all the confusion in the workplace, and can mess with the workplace business. Cyber technology leaves room for deviants to cause error, malicious activity and disruption within the systems of the workplace such as devices and the hardware that can become vulnerable to cyber-attacks.
(4)(9)(10)Lastly, Cyber policies are important in the cyber world when it comes to technology and their purpose in regulating all digital data exchanging aspects. Which includes, any data being transferred through the internet and the cyber policies should include different aspects to develop a great cyber policy. A cyber policy would include an introduction, purpose statement, and many more aspects. With technology growing all the time it is always a great idea for companies to sit down and talk about what different policies and infrastructures are going to be used and put in place. It is a smart move for companies to have these conversations because of different cyber-attacks and other issues that can arise in the world due to the internet and technology being a huge part of our lives. (5) Also, weighing out the companies risks when designing a cyber policy, this allows you to know the customer’s information so when an attack or risk occurs the policy will be designed the best way for the company and their customers. Since most attacks are unexpected and no one ever sees a cyber attack occurring the company has these different plans and policies set to be prepared. While different attacks can cause the company to lose money and cause damage to the company; data being breached can result in a costly accident for the company. Planning different cyber policies can be difficult because of the work and effort needed, but are important to keep a company safe, secure and successful from any harm to their franchise. While having a cyber policy and layers of protection for companies can be costly because of the work and effort needed, it ensures a successful outcome. With technology growing and evolving all the time, it is always smart for companies to consider having a cyber policy and infrastructure in place. With that being said, more evolving technology can lead to cyber-attacks, privacy breaches, and other damaging situations.
Conclusion
(11)Over the years different cybersecurity systems and policies have been helpful for companies and even personal computers because of the growth and evolution of technology. Even though these systems and policies can be costly when correctly designed they can benefit the company in the long run. Technology has become more convenient because of the different gadgets we have such as PCs, tablets, and mobile phones which have created great opportunities but not so great opportunities such as hacking situations and viruses. Even though unfortunate events can occur because life happens, knowing that I can be protected against cyberattack incidents due to the cybersecurity policies and systems that exist to help protect my vulnerable data and PC keeps my mind at ease.
References
P, B., S, R., & R, T. (2021). What Employers Can Do to Prevent Employees from Engaging in Deviant Work Behaviors – Recruit better. Hire better. | Streamline Your Talent Assessment with DeGarmo. Retrieved 9 December 2021, from https://www.degarmo.com/what-employers-can-do-to-prevent-employees-from-engaging-in-deviant-work-behaviors
What is Cyber Policy Online | Utica College. (2021). Retrieved 9 December 2021, from https://programs.online.utica.edu/resources/article/what-is-cyber-policy
Cyber Security Policy. (2021). Retrieved 9 December 2021, from https://www.betterteam.com/cyber-security-policy
Cyber Security – Protecting networks, computers and data. (2021). Retrieved 9 December 2021, from https://www.bsigroup.com/en-GB/Cyber-Security/
5 reasons why general software updates and patches are important. (2021). Retrieved 9 December 2021, from https://us.norton.com/internetsecurity-how-to-the-importance-of-general-software-updates-and-patches.html