{"id":300,"date":"2024-04-24T02:28:09","date_gmt":"2024-04-24T02:28:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/myona001\/?p=300"},"modified":"2024-04-24T02:28:09","modified_gmt":"2024-04-24T02:28:09","slug":"journal-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/myona001\/2024\/04\/24\/journal-7\/","title":{"rendered":"Journal #7"},"content":{"rendered":"\n<p>Developing a stable and efficient cybersecurity program in a business is essential for keeping it secure and its integrity intact, especially due to the increasing risk of cybercrimes and cyberattacks because of how much technology is advancing. A business holds many types of information that needs to be protected from potential cyber attacks, including tax information, employee information, customer information, and proprietary information, according to the National Institute of Standards and Technology (Paulson and Toth, 2016). If any of this information were to be manipulated by hackers or cyber criminals, many bad things could occur for the business, including damage or loss of information, loss of income, declined productivity, damaged reputation and credit, and more. These are all very adverse impacts of a potential cyber attack, therefore proper cybersecurity needs to be implemented into business operations in order to prevent said information from being tampered with or compromised so that businesses can continue to thrive and operate properly and efficiently. Implementing a strong information security program, for instance, can ensure that the sensitive information that businesses need to keep safe for customers or other partnering businesses are protected by properly assessing the risks that the business might face within the cyberspace and prepare the necessary precautions and measures needed to handle such risks\/threats. A threat can count as anything that might negatively effect the information a busniess needs to run, so being able to identify and understand such threats is essential for maintaining strong cybersecurity for a business. Improvements can also be made to implemented cybersecurity programs, such as a information security program, by taking advantage of new technologies that can thereby improve the quality in the delivery of services for customers while also lowering the costs.&nbsp; In taking this measure, there are many benefits that can be gained from implementing a secure cybersecurity program, including protection of data and sensitive information, competitive advantage over rival businesses, and the ability to maintain a good reputation.&nbsp;<\/p>\n\n\n\n<p>Paulson, C. and Toth, P. 2016. Small Business Information Security: The Fundementals. NIST. doi: 10.6028\/NIST.IR.7621r1&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Developing a stable and efficient cybersecurity program in a business is essential for keeping it secure and its integrity intact, especially due to the increasing risk of cybercrimes and cyberattacks because of how much technology is advancing. A business holds many types of information that needs to be protected from potential cyber attacks, including tax&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/myona001\/2024\/04\/24\/journal-7\/\">Read More<\/a><\/div>\n","protected":false},"author":28304,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/myona001\/wp-json\/wp\/v2\/posts\/300"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/myona001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/myona001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/myona001\/wp-json\/wp\/v2\/users\/28304"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/myona001\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/myona001\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/myona001\/wp-json\/wp\/v2\/posts\/300\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/myona001\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/myona001\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/myona001\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}