Employee training should be prioritized over technology in the budget. Cybersecurity Technology vs Training The average company is estimated to spend between 6% and 14% of its IT budget on cybersecurity (Bernard & Nicholson, 2025). Using that information and assuming that most of it goes to hardware and software, I would not prioritize technology over…
The CIA Triad
The CIA Triad is a key principle of information security. CIA stands for Confidentiality, Integrity, and Availability. The Triad is referenced when creating security policies. Confidentiality Confidentiality ensures that information is only accessible to authorized individuals or parties. Depending on its value and importance, organizations can categorize information and plan their security policy accordingly (Hashemi-Pour…
Cyber Roles & Responsibilities
System Security Engineers are an invaluable part of the Cybersecurity team. About SSEs The Cybersecurity team role that will be discussed is the System Security Engineer. A System Security Engineer, whether an individual or multiple people, is tasked with carrying out system security engineering activities and developing organizational systems (Nieles et al., 2017). As security…
Components of a Business
There are many components of a business, and each has its own roles and responsibilities. Information Technology is an integral part of any organization, and thus it has its own distinct roles and structures. Customer Service and Research/Development Besides the components listed in the presentation (referringto class content), there is also customer service and research/development….