How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
We should use the cyber-policy as guidelines to improve the performance of the infrastructure by implementing more policies. Implementing better policies for providing protection again cyber-attacks, making it necessary that authorization is required to be able to be granted access to sensitive information which improves the security and provides privacy when exchanging information especially from hackers.
The majority of the different information types are ranked either high, moderate, low or none depending on the activity scores, how much the business values specific assets and how much vulnerability or opportunities could potentially pose as a threat to their business. A lot of small businesses of course use specific descriptions to account for their information publication as well as for identifying the location and contacts for technological protection for their data. The cost of any technological protection such as fire walls as an example from breaches or viruses. Not to mention all the necessary hardware coverage of insurance which is always relevant with access, maintenance that is needed to provide and enable that technological support which totals up an overall score to help prevent breaches and to get a better understanding of the threats in order to prepare for future technical scenarios like having backups of information that could be destroyed that could endanger the business’s inventory, progress in growth or reputation. In conclusion, if I had to determine how to distribute the limited amount of funds to lower or eliminate threats and vulnerabilities, I would put like 50% of the money towards the more high-risk vulnerabilities 30% to moderate and 20% for low risk.
It would be beneficial for employees to provide awareness training for their employees to better understand how to handle potential threats or cyber-attacks. Sometimes preparing precautionary contingency plan can save sometimes save you a lot of trouble for example having a backup Flash drive that contains an exact copy of the data server to have just in case if the server’s data were completely destroyed could endanger the business’s inventory, progress in growth or reputation if it was all lost.