This article analyzes the importance of collaboration in dealing with cybersecurity. The fact that there has been increased collaboration means that the threat has continued to increase. Jeff (2016) indicates that organizations have faced this threat and has led to the downfall or collapse of businesses. In a case study of St. Jude medical, it faced a risk of cyber attack that led to the drop of its stock price (Jeff, 2016). Its customers were afraid that their personal information might be at risk as a result of such an attack. During this time, St. Jude had also planned to acquire another company but the deal failed due to the threat. Organizations today are required to conduct due diligence on cyber threats (Jeff, 2016). Without this, it becomes impossible to engage in any proper business deals as most businesses and individuals require this process before engaging into any contracts. This has led to increased costs, and as such has affected small and medium enterprises. Research has indicated that about $450 billion is used in preventing cyber attacks annually (Shannon & Mathew, 2016). This amount keeps on rising as technology continues to be more sophisticated. The case of election manipulation in the United States has shown the importance of implementing measures to deal with cyber threats.
According to Michael, 2016 was the year when a large number of cyber attacks were recorded (Michael, 2016). There were attacks on service providers such as Yahoo. There were many attacks on businesses that utilize different information system applications. The United States elections of 2016 may have been influenced by cyber attacks according to Michael (2016). One type of cyber threat that has been seen to cause problems to organizations and business is phishing (Michael, 2016). It involves stealing data using passwords. Michael states that individuals have failed to secure their passwords, and as such leading to an increase in cyber threats (Michael, 2016). For example, employees in an organization may opt to store passwords in their emails. It becomes very easy for hackers to log into the emails, steal the passwords, and use them to steal important data.
An article by Joel (2017) also recognizes the threats that information systems face as a result of cyber attacks. It indicates that as more people and organizations are connected to the internet, the threat of cyber attacks continues to increase (Joel, 2017). Digital technologies such as mobile phones and laptops have also increased this risk. As a result of these threats, the government has seen the need to collaborate with other organizations and institutions to deal with this issue (Joel, 2017). Through Homeland Security, the government gathers information relating to cyber threats from individuals, and organizations and act on them with immediate effect. On the other hand, organizations have also worked together to deal with this issue. The defense sector of the government is required to be more alert on this issue (Shannon & Mathew, 2016). Without Homeland Security taking all the necessary precautions, the economy of the United States can be greatly affected by cyber threats. However, businesses, and individuals must also be careful. Businesses should educate employees on cyber security issues while the government should educate the citizens on the same. It is thus important that organization come up with measures that are aimed at preventing these risks. These measures must be reviewed and updated from time to time to meet the changing technological needs.
References
Jeff, W. (2016). Cybersecurity concerns in M & A due diligence. Risk Management 63(9).
Joel, F. (2017). Cybersecuirty a focus of Homeland Security. Wyoming-Tribune Eagle.
Retrieved from https://www.questia.com/read/1P4-1890540190/cybersecurity-a-focus-of-homeland-security
Michael, M. (2016). Cybersecurity headlined Tech news in 2016. Honolulu Star-advertiser.
Retrieved from https://www.questia.com/read/1P3-4287850171/cybersecurity-headlined-tech-news-in-2016
Shannon, B., K., & Mathew F., C. (2016). Cybersecuirty a risk for board directors. National
Defense 101(754).
Â
Request Removal
If you are the original author of this essay and no longer wish to have it published on the thesishelpers.org website, please click below to request its removal:
- Electronic Documentation and Patient Safety - Essay on Public Health
- What are the most important aspects of Information and Communications Technology in Knowledge management?
- Essay Example on System Request
- Application of Healthcare Informatics and Technology to Inform Nursing Practice
- Computer Science Essay Example: Virtual Machines and vCenter Server
- Research Paper Example: Role of Board Members in Cybersecurity
- Why It Is Important for a Sports Management Profession to Learn Systems Development Lifecycle