Sample paper on 10 Ways to Fight a Growing Computer Security Threat

The score is a renowned nonprofit organization offering incredible business advice to small startups and big organizations. Their advisory and mentorship programs are grounded in getting the business off the ground, in growing and achieving its goals. The services are delivered by an immense network of volunteers at affordable rates in areas of business operations, confidential business workshops and business templates and tools on finance, marketing and technology, and general consultancy. Moreover, webinars on different business subjects exist too. However, this endeavor has its own strengths and weaknesses. In addition, Kehrer (2014), shares a lot of information in keeping the business data safe. The opinions as pointed out by Kehrer on the webinar to fight computer security are exhaustive and unlikely to reduce the escalating business data security.

The author elaborates an exemplary caution to a small business as the ease of targets to data theft. I concur with this argument since most small businesses are in the wake of embracing technology to compete effectively in the market. It is with this understanding, that majority of small businesses have automated their services to enhance efficiency and effectiveness. Owing to the several financial constraints exhibited by many startups, Kehrer suggests a scenario where many small businesspeople are oblivious of their vulnerability to hackers and data thieves. In my opinion, this sector of the economy through not ignorant is way below the techniques and skills exhibited by hackers. Moreover, many small businesses lack the capacity to constantly monitor their systems and detect any unscrupulous activities in time.

The article suggests data segregation as an alternative measure to ensuring data security in small businesses. This is a great idea in a small business dealing with security and resource issues. Moreover, segregating crucial data from the obvious company information will not only make it hard for any prospective hacker to hack into the business system but also avail no information towards his endeavor.  This could lower the estimate put forward by major credit card companies that 95% of data theft uncovered occurred at small businesses.

The article further, postulates the different forms in which the hackers evolve and hit their unsuspecting targets. In, addition the usage of malicious programs to steal crucial and confidential company information is a common aspect of data theft. However, it is to my understanding that ethical standards should be adopted in any business to control the spread of such programs that may compromise data security. In addition, any small business with point service terminals where such programs gain an entry should be guided without a protective antivirus that is regularly updated and checked.

The article has mentioned several software program considerations in aid of minimizing business computer threats. Among them are constantly revising passwords, using secure network connections, using secure software’s layers to send and receive data as well as updating software regularly. Though these are crucial steps in any business information technology arena, considering the psychology of hackers is also crucial. Most hackers and data thieves as are impatient and consider hacking into a secured site expensive and time-consuming. In that sense, they are likely to hit on an easy get a site that delivers immediate results. Considering this aspect, small businesses should employ the tactic of changing security measures regularly to make it hard for any prospective data thief to achieve his target. Moreover, in my opinion, any small business should set up a security trial of their system before commencing operation to guarantee clients’ safety.

Whether these ten points put forward by the author are likely to reduce the over 400% data theft reports from small business remain an issue of controversy. However, I think the proposal to get help the author puts forward to get help is a big step towards small business data security. In addition, caution should be adhered to in determining the best organizations and Information technology firms to seek help from, less you risk contacting hackers and data thieves themselves. Moreover, I see it wise for business startups to embrace gradual changes in incorporating computing technology in order to assess and understand the security challenges.

However, as part of data security and computer access policies, small businesses are likely to face a myriad of internal challenges that are not software-based that could lead to data security threats. Incompetence and ignorance arising from staff could lead to data crucial data loss or leak to an unauthorized person. Hence, the need for a policy agreement by all employees to secure small business-sensitive information should be employed.

In conclusion, according to Kehrer (2014), the article covers the state of vulnerability of small businesses to data loss and theft. However, the ten-point’s proposal on computer security does not exhaustively solve the menace surrounding hacking and data theft from small businesses. In addition, deliberate initiatives need to be considered that include compliance and policy regulations by a controlled government body. An all-rounded approach that centers even on the hacker’s psychology and business startup’s power to protect client’s information should be explored as well. Finally, the webinar, do offer strong insights on computing security for small business but they are unlikely to reduce the escalating cybercrime.

 

 

 

References

Kehrer, D. (2014). 10 Ways to Fight a Growing Computer Security Threat.Score. Retrieved from: http://www.score.org/resources/10-ways-fight-growing-computer-security-threat