Journal write up 3

Journal 3
Viewing the spreadsheet of data breach chronology dating all the way back from 2006-2017 from different companies all over the United States. With this information, cybersecurity analysts can get an estimation on the types of companies that are being targeted by hackers. This can also better prepare cybersecurity analysts to help update their policies on their standards of cybersecurity to better protect companies in the future. With this information they can also see the rapid growth of these attacks that have taken place over the past decade and how common they are becoming. With this information, this can be an eye opener for companies to see just how common these attacks are and how much money they can potentially lose is not taken seriously. In which case they will be more willing to spend more money in cybersecurity then they would if they didn’t see this data in the first place.

Leave a Reply

Your email address will not be published. Required fields are marked *