{"id":241,"date":"2023-06-21T20:51:59","date_gmt":"2023-06-21T20:51:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mgree035\/?p=241"},"modified":"2024-01-28T19:28:39","modified_gmt":"2024-01-28T19:28:39","slug":"eportfolio-entry-4","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mgree035\/2023\/06\/21\/eportfolio-entry-4\/","title":{"rendered":"ePortfolio Entry #4"},"content":{"rendered":"\n<p><strong>What are the costs and benefits of developing cybersecurity programs in business?<\/strong><\/p>\n\n\n\n<p>Developing cybersecurity programs provides a multitude of benefits for a business with the main benefit being the protection\/safeguarding of the network of systems and machines being used for daily operations.\u00a0 A cybersecurity program is typically developed for risk management and is usually developed for the specific needs of the business.\u00a0 There are some programs that are premade that the business could use, but I don\u2019t believe it\u2019s as common.\u00a0 The program covers many different aspects, typically starting with risk assessment where potential risks are identified, evaluated based on potential impact on the business, and risk-reduction measures are recommended, but not yet implemented.\u00a0 The next step in the program typically involves risk mitigation, where measures are taken to reduce the impact of the risks assessed in the before step.\u00a0 These measures involve risk avoidance, risk mitigation, risk acceptance, risk transference, and once again, the evaluation of the assessed risks.\u00a0 And lastly, comes evaluation and assurance, where risks are continuously assessed and evaluated, and this step also involves regulatory compliance; regulatory compliance meaning the maintenance of the policies, processed, and controls used to implement and perform the before steps.\u00a0 All the steps involved in the risk management process are performed in a cycle if that makes sense; meaning, the steps are performed in order and performed again periodically or as needed in the same manner.\u00a0 Doing this brings a strategic and systematic approach to the risk management process.\u00a0 And ensuring the network is safeguarded results in a better reputation and increased reliability into play, which could also be seen as a benefit as other businesses will be more likely to collaborate.\u00a0 <\/p>\n\n\n\n<p>There aren\u2019t too many costs relative to the benefits of developing a cybersecurity program.\u00a0 The main cost is the actual cost of developing the program, like how much money is budgeted and spent.\u00a0 The cost could depend on the size of the business and what needs to be protected, and it also could depend on what the company is willing to spend.\u00a0 A small business may not have the budget for an advanced cybersecurity program, but at the same time, a large business may not be willing to spend what is required for an advanced cybersecurity program as the cost is relative to how much needs to be protected.\u00a0 There are a lot of elements\/factors that go into determining the price that may or may not even reflect the size of the business; it could be more expensive <em>because<\/em> it is more advanced, such as something that involves PKI.\u00a0 Cyberattacks can result in a company losing millions of dollars and ton of lost time, so subjectively, the benefits will almost always outweigh the costs of protecting the network in the long run.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What are the costs and benefits of developing cybersecurity programs in business? Developing cybersecurity programs provides a multitude of benefits for a business with the main benefit being the protection\/safeguarding of the network of systems and machines being used for daily operations.\u00a0 A cybersecurity program is typically developed for risk management and is usually developed &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/mgree035\/2023\/06\/21\/eportfolio-entry-4\/\">Continue reading<\/a><\/p>\n","protected":false},"author":26743,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/241"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/users\/26743"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/comments?post=241"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/241\/revisions"}],"predecessor-version":[{"id":242,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/241\/revisions\/242"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/media?parent=241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/categories?post=241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/tags?post=241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}