preview

Identity Theft

Decent Essays

notify all their customers of the impending danger and each one of them should be vigilant so as not to be a victim of circumstances. Identity theft has led to increased demand for security online and all business should ensure that it protects all its customers from such instances.
5.2 Internet of things (IoT) It involves a system of interrelated computing devices that are provided with unique identifiers and can transfer data without the need for human-computer interaction or human to human interaction (Tebbutt, 2009). The system can consist of mechanical, digital, objects humans or animals. A good example is a car fitted with a system that can be able to alert the driver when the tire pressure is low. There is no connection between the …show more content…

As already noted, identity theft has been the key reason why customers are getting worried (Koops, & Leenes, 2006). Some information leak can be so destructive to other people and the business as well and the need for better and improved standards of privacy when it comes to businesses. A business which has not secured customers data might be in to lose its customers due to trust issues that will arise.
One most important thing that customers look at before deciding on transacting with a business is the privacy and protection of customer information. Without assurance that the two are guaranteed, many will drift away as they need security and protection online. Fraudsters are also over online and much are worried about the safety and security of services online. The fact that many are using services to transact their businesses, calls for more vigilant and secure platform that will protect information related to customers against breach which can lead to identity theft. Businesses that are establishing should employ more efficient cyber security strategies to ensure that they curb the problem of data breach (Gold, …show more content…

Recommendations Various businesses across the world should be a lot more careful to ensure that they protect their information from reaching harmful or criminal hands. The first recommendation is to ensure that there are procedures that packets for data collection should follow before they can a trusted network. This will help reduce entry of malicious viruses and people who want to hack information. If say every business in the world embraced this method and protected all the information from leaking, then data breach and theft will be controlled. There should be improved collaboration among businesses, the digital connection, and information technology. This will help find solutions faster that are far much long lasting to the problem of cyber security (Cavelty, 2008). If all businesses decided to work on their own, the digital world will not be able to know problems that arise and it is likely to arise a situation where the crisis cannot be solved. Equally, the information technology experts need to collaborate with the other stakeholders to ensure that much is being done to curb the problem information leak that arises due to accidents and other methods.
7.

Get Access