{"id":202,"date":"2021-03-10T21:16:05","date_gmt":"2021-03-10T21:16:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/?p=202"},"modified":"2021-04-26T14:24:02","modified_gmt":"2021-04-26T14:24:02","slug":"select-4-majors-that-are-offered-at-odu-and-how-do-they-relate-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/2021\/03\/10\/select-4-majors-that-are-offered-at-odu-and-how-do-they-relate-to-cybersecurity\/","title":{"rendered":"J2: Select 4 majors that are offered at ODU and how do they relate to cybersecurity?"},"content":{"rendered":"\n<p>Four jobs related to cybersecurity:<\/p>\n\n\n\n<ol type=\"1\"><li>Business<\/li><li>Management<\/li><li>Marketing<\/li><li>Health Professions<\/li><\/ol>\n\n\n\n<p>Healthcare<\/p>\n\n\n\n<p>Hospitals are massive corporations with hundreds of thousands of patients that are constantly walking through their doors.&nbsp; This means hundreds of thousands of patient records being maintained. &nbsp;Data breaches were amongst one of the largest reported incidents when it came down to data security in 2015 (USF Health).&nbsp; While electronic healthcare records (EHR) create efficiency, cut down on time, and provide better organization, it still can allow and create a large attack surface.&nbsp; It is easy to miss small hacks and breaches with such large corporations, especially if it isn\u2019t directly making an impact right off the bat.&nbsp; It was noted to be common that major healthcare organizations were not implementing any method of cybersecurity until major breaches occurred. &nbsp;It is crucial to have cybersecurity standards in place because \u201chealthcare organizations are experiencing at least one hacking incident per month over the previous 12 months.\u201d It\u2019s noted that hackers are mostly focusing on software vulnerabilities, and hospitals don\u2019t seem to be focused on IT \u201ccleanliness\u201d and its integration in the company.&nbsp; Healthcare largely relates to cybersecurity \u2013 just think about how many systems and monitors are constantly connected to a network or the internet.<\/p>\n\n\n\n<p>Cybersecurity Management<\/p>\n\n\n\n<p>Cybersecurity management is more than just managing software\/hardware and working with firewalls.&nbsp; It is a key functioning piece in organizations as it helps keep a balance between trust and a \u201chealthy\u201d cybersecurity program. A solid program will later help a company with possibly customers and their trust, managing budget from prevention of hacks and so forth. &nbsp;According to PARANET, 35 data records were stolen every second in 2016 and the average security breach expense is expected to be around 150 million.&nbsp; Ideally, companies should be proactive and not reactive.&nbsp; If they focus on prevention, they can help establish a solid strategy that will fit within budgets and so on.&nbsp; A large role in functioning cybersecurity is training which should incorporate all employees, contractors, vendors, etc.&nbsp; Training is not simply one and done, it is a consistent evolution.&nbsp; Cybersecurity is constantly changing, technology is ever-changing as well.<\/p>\n\n\n\n<p>Small Business<\/p>\n\n\n\n<p>Businesses are everywhere, they can be as basic as just using emails and maintaining websites, or owning a massive business corporation that is worldwide.&nbsp; Regardless, it is crucial to mitigate risks and watch for fraud or theft (physical or digitally). As the previous jobs and majors stated, maintaining personal information is extremely important.&nbsp; Small businesses may not have as much personal information as a healthcare setting, but they will have personal information like addresses and credit cards stored \u2013 which is why it is important to have a solid foundation so it isn\u2019t accessible to the general public.&nbsp;<\/p>\n\n\n\n<p>Marketing<\/p>\n\n\n\n<p>Marketing can play several roles in cybersecurity; target for hackers, a risk for enterprises, or be an advocate for cybersecurity awareness.&nbsp;<\/p>\n\n\n\n<p><em>Role 1: Marketing as a target<\/em><\/p>\n\n\n\n<p>Marketers make it easier for hackers trying to compromise organizations cybersecurity programs because they are typically more open than just the typical everyday person or company. Marketers may have a larger social media presence, constantly promoting things or looking for promos.&nbsp; It would be considerably easy for a hacker to send a malicious link and someone open it in an email and now everything is compromised.<\/p>\n\n\n\n<p><em>Role 2: Marketing as the risk factor<\/em><\/p>\n\n\n\n<p>It is important for marketers to realize and understand the important in working with IT on security protocols when newer technology is introduced.<\/p>\n\n\n\n<p><em>Role 3: Marketing as the champion<\/em><\/p>\n\n\n\n<p>Create a culture in cybersecurity that ensures and promotes the important of training, good password protocols, physical security enforcement, social engineering awareness and so forth.<\/p>\n\n\n\n<p>Creative, 3. (2020, May 05). What you need to know about cyber security management. Retrieved March 10, 2021, from https:\/\/www.paranet.com\/2018\/02\/16\/what-you-need-to-know-about-cyber-security-management\/<\/p>\n\n\n\n<p>Cybersecurity for small business. (2020, January 17). Retrieved March 10, 2021, from https:\/\/www.fcc.gov\/general\/cybersecurity-small-business<\/p>\n\n\n\n<p>Healthcare cybersecurity job description. (2020, November 02). Retrieved March 10, 2021, from https:\/\/www.usfhealthonline.com\/resources\/career\/healthcare-cybersecurity-jobs\/<\/p>\n\n\n\n<p>Rizkallah, J. (2017, December 05). Council post: The role of marketing in cybersecurity. Retrieved March 10, 2021, from https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2017\/12\/05\/the-role-of-marketing-in-cybersecurity\/?sh=6f4d2a582027<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Four jobs related to cybersecurity: Business Management Marketing Health Professions Healthcare Hospitals are massive corporations with hundreds of thousands of patients that are constantly walking through their doors.&nbsp; This means hundreds of thousands of patient records being maintained. &nbsp;Data breaches were amongst one of the largest reported incidents when it came down to data security &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/moralesrebekah\/2021\/03\/10\/select-4-majors-that-are-offered-at-odu-and-how-do-they-relate-to-cybersecurity\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">J2: Select 4 majors that are offered at ODU and how do they relate to cybersecurity?<\/span><\/a><\/p>\n","protected":false},"author":19836,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/202"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/users\/19836"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/comments?post=202"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/202\/revisions"}],"predecessor-version":[{"id":214,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/202\/revisions\/214"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/media?parent=202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/categories?post=202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/tags?post=202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}