Preview

Preventing Security Breaches Collaborative Summary

Satisfactory Essays
Open Document
Open Document
499 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Preventing Security Breaches Collaborative Summary
Preventing Security Breaches: Collaborative Summary
Isaac Williams
BIS/221
December 22, 2014
Mary Robbins
Preventing Security Breaches: Collaborative Summary

During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.

“The Right Technology Fix Can Help Prevent Breaches”
Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)

While the effects of one of these attacks is realized at a much higher price point for larger businesses, smaller companies are actually targeted more often because of their lack of security infrastructures and data monitoring systems. In fact, Horton claims that more than 90% of data breaches affect small businesses. (Horton, 2014) These startling numbers leave many small business owners wondering what they can do to reduce the risk associated with cyber-attacks.

There are countless steps that can be taken to safeguard a company’s data systems against intrusions; however, our collaborative discussion stressed three. Our team reviewed the benefits of updating POS



References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved December 19, 2014, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458 Ponemon Institute. (2013, May 28). 2013 Cost of Data Breach: Global Analysis. Retrieved December 19, 2014, from Ponemon Institute: http://www.ponemon.org/local/upload/file/2013%20Report%20GLOBAL%20CODB%20FINAL%205-2.pdf

You May Also Find These Documents Helpful

  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    By using these preventative measures businesses can save the U.S $44 billion dollars, productivity and time associated with recovering data from a breach. Also stated in this article was how 70% of security breaches occur because of an end user error. This is why it is necessary to insure ourselves with better technology such as backup data loss prevention and encryption to defend data from human error, as stated above. We have to remember that hackers invent new methods every day to get their hand on important information, and that is why you can never be too careful when it…

    • 485 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Bibliography: Data Breach Cost Part one: risks, costs and mitigation strategies for data breaches. (2011, Sept). Retrieved Jul 19, 2012, from Zurich American Insurance Corporation: www.zurichna.com…

    • 3978 Words
    • 16 Pages
    Best Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Despite the fact that there are numerous state and federal reporting agencies, an incredible amount of businesses and regular personal computer users do not report incidents. Among businesses, specifically, ninety percent of cyber crime goes unreported while only two percent of those that are reported end in a conviction. Because businesses have so much of the population 's personal information, and their validity depends on the consumer 's ability to depend on and trust the business, the businesses find a larger risk in revealing that their computer systems are susceptible breaching than the actual loss from a cyber attack. Succinctly, the economic loss from consumer 's mistrust would create a financial loss more damaging than the cyber attack…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Jarvis, K., & Milletary, J. (2014, January 24). Inside a targeted point-of-sale data breach. Retrieved from http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Better Essays

    References: Arrington, J. (2011, June). Staples Business Depot hit by data security breach. Retrieved from Cryptzone: http://www.cryptzone.com…

    • 1943 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Crimes

    • 2557 Words
    • 11 Pages

    The Computer Crime and Security Survey, issued by the Computer Security Institute (CSI) and the FBI, reported that 85 percent of the 538 firms and governmental institutions surveyed found security breaches in 2000. Sixty-five percent admitted that such breaches had caused financial losses. The 186 respondents willing to quantify their losses claimed they totaled $378 million, a 42-percent increase from 1999 and the highest amount recorded since the surveys began in 1995. Seventy percent cited their Internet connections as the source of security problems.…

    • 2557 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Hobson, D. (2008, August 8). The real cost of a security breach. SC Magazine. Retrieved July 13, 2014, from http://www.scmagazine.com/the-real-cost-of-a-security-breach/article/113717/…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The expanded use of the internet and the amount of credit card purchases worldwide are the major contributors to the increase in security breaches for companies and organizations. Pressure is put on businesses and credit card companies to minimize the security issues. The credit card companies push the liability of loss onto the business who allow the breach; thus doubling the individual company’s expenses for security and having to reimburse the consumer’s losses. The uncertainty raises consumer questions on who to trust with credit card purchases. The TJX Cos. Inc. security breach was the largest to date and has forced the company to spend money to deal with the security problems as well as attempt to retain customers and attract new ones.…

    • 302 Words
    • 2 Pages
    Good Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Organizations must ensure the security and control of systems and transactions with clients and vendors. What security breaches may cause harm to an organization or its clients? Why is it important to ensure a proper level of security? What tools are available to prevent breaches?…

    • 369 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Data Breach Research Paper

    • 1510 Words
    • 7 Pages

    When data breaches occur, it can be extremely costly towards a company. They may be required to pay fees directly to consumers, or pay for technology that increases their security so a hack does not occur again. Either way, corporations should understand the cost that a hack of consumers’ information could cost them. Ponemon Institute researched this and found, “data breaches cost companies an average of $221 per compromised record – of which $145 pertains to indirect costs, which include abnormal turnover or churn of customers and $76 represents the direct costs incurred to resolve the data breach, such as investments in technologies or legal fees” (2016 Cost of). Corporations should invest more into security systems…

    • 1510 Words
    • 7 Pages
    Good Essays