preview

Improving New Technology Systems From Cyber Criminals

Decent Essays

In our growing complex world companies rely heavily on their IT infrastructure to accomplish critical business functions. To effectively compete in a fast-paced, multifaceted, global economy, organizations are employing new technologies at an unprecedented rate. In most cases, either ignoring or not fully understanding the increased exposure to their business. The difficulty’s facing organizations today in this global market is how they will protect new technology systems from cyber criminals. The challenges that organizations face today lays in security both physical and logical. Having good physical security in place is just as important as having those logical controls. Organizations today need both having one without the other …show more content…

There could also be a power failures that can disrupt operations. The intention of every organization should be to have a contingency plan in place throughout its business units to help enterprise business continuity and disaster recovery. In addition to continuity planning organizations must maintain a current security policy that enforces employee training. Human threats either intentionally or unintentional can have a significant effect on an organization. Physical security is only half the battle organizations must also have those logical controls in place. Threats come from outside influences that want to penetrate the business the reasons range from stealing data to hacktivism. As corporations continue to face new risks they also have to contend with the difficult task of protecting both internal and external customers against identity theft. Logical controls are used to safeguard against unauthorized access to computing resources. Logical controls are a combination of hardware and software used to detect and prevent intruders on the corporate network. There are also detection systems that focus on suspicious activity on the host based to fight against insider threat. When a company has systems in place to monitor network behavior, it can flag anomalies in traffic traversing the network. Target Corporation had this type of software installed

Get Access