Module 4

A cost of not developing cybersecurity programs for a business especially a small business, it can have a negative impact on the business. Not having a cybersecurity programs are more costly on small businesses because they can have a lack of knowledge or lack of resources about cybersecurity programs to prevent cyberattacks from happening. Another cost of not developing cybersecurity programs for a business especially a small business is that small business has weak online security.  The cost of cybercrime can be devasting to a small because in 2013, cyberattacks cost small businesses a whopping of $8,699 per attack. Today, that number skyrocketed to $20,752 per attack. So, the cost of cybersecurity programs can cost businesses a major amount of money, not only financial losses, but also lawsuits from customers that are invested in the business.  The cost of not having cybersecurity programs in businesses can jeopardize customers records consisting of financial information and health records that are stolen could cost a business a lot of money due to the sensitive data that is contained. Which can cause a business to lose customers and financial income. Not having cybersecurity programs can not only cost for cybersecurity attacks, but it could also cost the whole company to be shut down.   A benefit that I found in the NIST article about “Small Business Information Security: The Fundamentals” is that small businesses produce approximately 46% of our nation’s private-sector output and create 63% of all new jobs in the country. In my opinion there is no sure way to tell if your computer is safe. No matter the type of the computer if connected to the internet with even the most competent anti-malware applications, hardware and software firewalls, routing schemes, and even encryption are inadequate to ensure that your computer and data is completely secure, because there is no such thing as genuinely complete security. The only way to really to ensure your computer is safe if its hard drive is completely wiped, is disconnected from the Internet, turned off, unplugged, and locked in a vault to which only you have the key.

Leave a Reply

Your email address will not be published. Required fields are marked *