{"id":291,"date":"2023-04-24T01:18:44","date_gmt":"2023-04-24T01:18:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/morris-smith\/?p=291"},"modified":"2023-04-24T01:18:44","modified_gmt":"2023-04-24T01:18:44","slug":"my-distribution-of-my-companys-budget","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/morris-smith\/2023\/04\/24\/my-distribution-of-my-companys-budget\/","title":{"rendered":"My Distribution of My Company&#8217;s Budget"},"content":{"rendered":"\n<p>My Distribution of My Company\u2019s Budget<br>Overview<br>I believe it is very important to make sure that there is a balance between each branch of a<br>cybersecurity department, especially with limited funding. You want to make sure that no<br>branch is funded inadequately because it can cause the downfall of the company risks you of<br>cyber-attacks. I will try to rectify this and make sure that all my branches of the company have<br>the required resources and lay down a foundation that can be built up over time when more<br>money is available.<br>Employees\/Training<br>Employees are the most important part of a company. These are the people that are constantly<br>working with data and need to be trained accordingly. Employees are often the weakest link in<br>an organization\u2019s cybersecurity defenses, and investing in training can help them respond to<br>threats and attacks more efficiently. I would allocate around 30% of the funding to training and<br>20% to their pay. It needs to be made sure that the employees are trained very well to make<br>sure they aren\u2019t the company\u2019s downfall. I would prioritize their training to learn how to defend<br>against hacking attacks such as phising and brute force attacks. If they can defend the company<br>or at least recover quickly after an attack, the company will be able to flourish and make more<br>money to allocate.<br>Technology<br>Then the rest of the money will be going to the technology we have available. Technology is<br>what makes the cybersecurity company and if it is lacking then it will be very hard to get any<br>business and defend against hacker attacks. It\u2019s important that we have up to date technology.<br>As I said before, however, technology isn\u2019t everything and hackers will always find a way to get<br>around it as it progresses that is why it is so important that we make sure that both the tech and<br>the employees are given enough resources to be successful.<br>Conclusion<br>In conclusion, striking a balance between spending on technology and acquiring personnel is<br>essential in the end. Both are crucial components of a robust cybersecurity strategy, and<br>investing in them in the sequence that best addresses the needs and threats particular to your<br>business will help you make the most of your limited funding.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>My Distribution of My Company\u2019s BudgetOverviewI believe it is very important to make sure that there is a balance between each branch of acybersecurity department, especially with limited funding. You want to make sure that nobranch is funded inadequately because it can cause the downfall of the company risks you ofcyber-attacks. I will try to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/morris-smith\/2023\/04\/24\/my-distribution-of-my-companys-budget\/\">Read More<\/a><\/div>\n","protected":false},"author":26273,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/morris-smith\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/morris-smith\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/morris-smith\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/morris-smith\/wp-json\/wp\/v2\/users\/26273"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/morris-smith\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/morris-smith\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/morris-smith\/wp-json\/wp\/v2\/posts\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/morris-smith\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/morris-smith\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/morris-smith\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}