Monday, January 27, 2020

Security Threats in Businesses

Security Threats in Businesses Musa Hajara Muhammad Introduction The business environment is becoming a fast paced globalized economy that depends on information and data carried via open channels. As a business organization, it is critical to maintain and protect both physical and virtual property that is being owned against intruders, potential theft and other acts that could cause loss of any form. Dominos, for example, one of the biggest pizza delivery company faced a massive data breach where customer information was made public, hence resulting in loss of sales and customers. In today’s global, digital world, data rules. Safeguarding intellectual property, financial information, and a company’s reputation is a crucial part of business strategy. With the number of threats and the sophistication of attacks increasing, safeguarding becomes a formidable task.Businesses, both small and big are under massive attacks by external agents in order to get credit card information and other confidential data which can be have a negative imp act on the growth of the business. However, this security threats are not limited to attacks from the outside, but also from within the firm (BusinessSecurity, 2013). A recent survey shows that 80% of security breaches are caused by insiders- most often employees, more than 20% of attacks on the corporate WEB sites come from the inside, almost 30% of companies, experience more than 5 attacks from the inside every year. However, it has also been argued that having too much security may affect business processes. According to Cowan (2012), while there are various security solutions to help protect businesses from potential reputational or financial damage, a heavy investment in business security solutions may have a counter-productive impact on the business. It can affect the corporate culture, flow of information and operational processes, leading to inefficiencies and productivity loss (Cowan, 2012). On the other hand, being too permissive can have the same result, with employees able to access, share, lose or damage sensitive data too easily (Cowan, 2012). According to Cowan, business security needs to be tailored to each business depending on their respective risks and business objectives, that is, Security measures must neither be so restrictive that they affect business processes, nor too relaxed and thereby causing harm (Cowan, 2012). The key is to weigh up all the risks and vulnerabilities, potential consequences and controls, and then decide which information assets to protect and which can be accessed and shared openly without major consequences. Following a risk-based approach will lead to business growth and spending the right amount of time and money on the right level of protection in the right areas (Cowan, 2012). As a result of the negative issues of security threats to businesses, many companies today are adopting a corporate security strategy. Corporate securityidentifies and effectively mitigates or manages, at an early stage, any developments that may threaten the resilience and continued survival of a corporation. It is a corporate function that oversees and manages the close coordination of all functions within the company that are concerned with security, continuity and safety (Wikipedia, 2010). Core components of corporate security includes personal security, physical security, information security, corporate governance, compliance and ethics program, crime prevention and detection, fraud deterrence, investigations, risk management, business continuity, and crisis management (Wikipedia, 2010). While it takes effecting time planning to implement, Bordoloi (2012) argues that developing an effective governance approach to corporate security results in five basic outcomes: Reduced risks and potential business impacts to an acceptable level; Strategic alignment of security with the enterprise strategy and the organizational objectives; Business value generated through the optimization of security investments with organizational objectives; Preserved and increased market share due to the reputation for safeguarding information; Efficient utilization of security investments that support organization’s objectives. Also Adhering to a good corporate security policy can assist senior management to help them make decisions and then pass the essential actions to those in management positions. Al-Awadi Renaud (2008) argue that implementing an effective security solution can be complex and time consuming, stating that while it can slow a firm growth due to the resources involved, it is the key strategy for the sustainability of a firm in the 21st century. Al-Awadi Renaud (2008) identified five key factors for the successful implementation of a business security strategy. They include awareness and training, budget, management support, Information Security Policy Enforcement and Adaptation and organization mission. Critical success factors for security policy implementation Dhillon (1999) argues that, organizations must have ongoing education and training programs to achieve the required outcome from the implementation of an information security policy. The 2002 security awareness index report cited by McKay (2003) concluded that organizations around the world are failing to make their employees aware of the security issues and the consequences. Hone Eloff (2002) explain that the behaviour and attitudes of employees towards information security will be more in line with secure behaviour if top management demonstrates concern, therefore it is suggested that the tone of security is set by the attitudes of those at the top of the organization (Hinde, 1998). Management wont act to support the information security unless they can see that it supports the organizations core business function (Blake, 2000). Hence they must be convinced of the importance of information security before they will to provide sufficient budget, and act to enforce the information security policy (Von Solms, 1999). Also, Bjorck (2002) describes budget as the financial facility which firstly rationally estimates the costs and secondly assesses the access required to the resources to achieve successful implementation of information security. Organizations require adequate funding (Doherty Fulford, 2005) to achieve effective information security. â€Å"Budgets generally depend on the manner in which individuals’ investments translate to outcomes, but the impact of security investment often depends not only on the investor’s own decisions but also on the decisions of others† (Anderson Moore, 2006, p.612 ). Lack of information security budgeting in organizations leads to under- investment in appropriate controls (Dinnie, 1999). Moreover, Fung et al. (2003) explains that a good security policy is the keystone to a sustainable business growth. There is no doubt that the adoption of a security policy is the initial measure that must be in place to minimize the threat of unacceptable use of any of the organization’s information resources. And lastly, Siponen (2001) explains that in terms of security, organizations usually do nothing as long as nothing goes wrong, but when things do go wrong, they suddenly pay attention and a lot of effort is required to recover from the situation, even though sometimes full recovery is impossible. Some of the experts said that the organizations clear goals and objectives are essential in implementing security policies and that having a culture of secure information in the organization will affect its success. Conclusion Information is knowledge, and knowledge is power. Businesses are beginning to understand the need to demonstrate to customers that their information is being handled securely, especially in the light of numerous data breaches such as the NSA scandal. When customers are aware that the information a firm possesses about them is highly secured, they tend to build confidence in such a firm, and invest even more. What has been discovered from the analysis above is that firms that are concerned about security are more likely to survive both internal and external threats posed to them. However, due to the complexity of implementing these security initiatives, certain schools of thought are of the opinion that it may take firms concerned with security time to grow. These thoughts have led to the emergence of security analysts, data managers, network and security engineers, and other security personnel who specialize in safe guarding company data and information from various mishaps. In recent years the amount of money pumped into security firms around the world simply goes a long way to reiterate the fact that firms are getting keener about security investment. $15 million pumped into Cylance, $23 million into EndGame, and a whopping $50 million into FireEye are a few from the several investment deals reached with tech security companies. (Bryon Acohido, 2013). Investing in security can cost a company a large amount of its resources, but not adequately investing in securing its most valuable asset, which is information can cause a company to totally shut down in the case of any data exposure or loss. Alpex Consulting Africa Managing Director, Joseph Kibe, in Kenya said, â€Å"Organizations have lost a lot of data and there must be a lot of losses incurred because of customers’ data being thrown away when information leaks to the wrong hands. The economy has to wake up and secure this information†¦if you walk into an insurance firm, a bank, or a hospital, is your information secure? That is what will determine who makes it †¦Ã¢â‚¬  For a successful security policy, organizations must institute security policies to prevent unauthorized access to their resources. Steps must be taken to ensure that employees get the required awareness and security training to make them aware of the security issues and the consequences of insecure behavior. Moreover, the results suggest the ethos of security must come from the top of the organization to encourage a serious attitude from employees and an expectation that they will comply with the organizations security policy rules and regulations. A point worthy of note is that, for a firm to think about security in the first instance, it must already have a decent amount of presence over the internet. This alone, can make a company gain more profit and recognition due to its global presence. Most security breaches occur in the most developed of countries, and this is because of the level of advancement in technology, and also sophistication in cybercrime. A country who is just at the developing stage seldom experiences high level of security mishap. This goes a long way to say that the level of development in a country can be directly proportional the amount of cybercrime that occurs in that country. Implementation of security won’t be possible if a sufficient budget is not allocated. Clear organizational mission statements and goals result in positive employee behavior and positive attitudes towards securing the organization’s information assets. Just like a car, building, or machine, information is an asset, and the most valuable in this era of information technology. Safeguarding such a valuable asset will in no way slow down the growth of a firm, but set it apart from its adversaries. References Bordoloi, C. (2012) 5 Benefits of Proper IT Security Governance URL: http://www.enterprisecioforum.com/en/blogs/cj-bordoloi/5-benefits-proper-it-security-governance Accessed (23/06/2013) Bjorck, F., 2002. Implementing Information Security Management Systems – An Empirical Study of Critical Success Factors. Wikipedia (2010) Corporate Security URL:http://en.wikipedia.org/wiki/Corporate_security Accessed (23/06/2013) Dhillon, G., 1999. Managing and Controlling Computer Misuse. Information Management Computer Security, Vol. 7, No. 4, pp. 171-175. Doherty, N. F. and Fulford, H., 2005. Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis. Information Resources Management Journal, Vol. 18, No. 2, pp. 21-39. DeviceLock (2012),Corporate security: risks of the insiders attack URL: http://www.devicelock.com/articles/detail.html?CODE=corporate_security Accessed (23/06/2013) Business Security (2013) Understanding Business Security URL:http://www.businesssecurity.net/ Accessed (23/06/2013) Cole, E (2010) Importance of cyber security to protect your business URL: http://www.securityhaven.com/specialist/cyber-security-for-business.html Accessed (23/06/2013) Hone, K. Eloff, J.H.P. 2002. What makes an Effective Information Security Policy. Network Security, Vol. 20, No. 6,pp. 14-16. Fung, P., Kwok, L. Longley, D. 2003. Electronic Information Security Documentation. Australian Computer society, Vol. 21. Dinnie, G., 1999. The Second Annual Global Information Security Survey. Information Management computer security, Vol. 7, No. 3, pp. 112-120. Hind, S. 2002. Security Surveys Spring Crop. Computers and Security, Vol. 21, No. 4, pp. 310-321. McKay, J. 2003. Pitching the Policy: implementing IT Security Policy through Awareness. SANS Institute. Von Solms, R. 1999. Information Security Management: Why Standards are Important. Information Management Computer Security, Vol. 7, No. 1, pp. 50-57.

Sunday, January 19, 2020

Interpretation of Shakespeares Romeo and Juliet :: Shakespeare, Romeo and Juliet

Interpretation of Romeo and Juliet What would cause young lovers to mysteriously commit suicide so they can be together? Is it their parents who forbid them to see one another, or is it themselves? William Shakespeare's play, Romeo and Juliet, tells about two young "star-crossed lovers" whose deaths were caused by fate, not their parents or themselves. First of all, Romeo and Juliet were from feuding families: Romeo a Montague, and Juliet a Capulet. Romeo was so depressed about his unrequited love for Rosaline when it just so happens, he goes to a masquerade party. There, he falls for Juliet, the daughter of Lord Capulet, and forgot about Rosaline. When they're finally torn apart, that's when both Romeo and Juliet realize they are from enemy families. Their love, of course, brings down their immediate marriage and Friar Lawrence agrees in hope to stop the feuding families. Unfortunately, Tybalt and Mercutio are killed and Romeo gets banished leaving Juliet without a husband or a cousin. "O, I am a fortune's fool," (Act III, Scene I) explains how Romeo felt at the moment of Tybalt's death. He felt that he fell into one of fate's many cruel games and it was too late to get out. When things are just getting worst, Lord Capulet arranges for Juliet to marry Paris causing Juliet to panic. She then has to hurry and do something to stop the wedding and of course fate would just happen to guide her back to Friar Lawrence. Fate wouldn't just stop there. He just kept on going. He has it arranged that Friar John, the messenger who was suppose to deliver the news of Juliet's fake death, quarantined. Romeo finds out that Juliet is dead from Balthazar and screams out, "Is it e'en so?--Then I defy you, stars!" (Act 5, scene 1, pg. 213). He blames Juliet's death on fate and returns to Verona with poison to join her. He leaves a little before Friar John tells Friar Lawrence about his failure to deliver the message. Still, fate didn't stop there. He then makes Friar Lawrence leave his cell and rush to the Capulet vault . Unfortunately, Friar Lawrence is just a little too late and Romeo gets there before he

Saturday, January 11, 2020

Competitive Advantage by Human Resource Management Essay

In today’s climate of global competition, the source of motivation varies–some are driven by money, some by a yearning to build relationships (Hollyforde et al, 2002). Yet, with the development of technology and global competition, new ways of working -these changes have had significant implications for the majority of the full-time workforce within the industrialized world, there are some issues, such as leadership, teamwork, empowerment etc, which are vitally important and need to be managed carefully, each of these concepts merits deeper analysis as we enter the 21st Century. Therefore, it is important to explore how contemporary human resource management (HRM) develops to highly skilled, loyalty employees and affect organisation’s performance, thus resulting in significant competitive advantages. This assignment will discuss and present some arguments regarding this statement from the following two areas: How contemporary HRM affects organisations’ performance based on the cases of Xerox and Microsoft, and recommendations for organisations how to gain competitive advantages through implementation of good HRM for a better 21st Century.

Friday, January 3, 2020

The Financial Crises Of 2008 - 1702 Words

The Financial Crises of 2008 is an ongoing global financial crises that is the worst catastrophe in modern banking since the Great Depression. Four million people lost their jobs and another one million people lost their homes. A lot of people were and are still affected by this catastrophe which was easily preventable had there been a general populous that was financially literate. It seems as if the banks are looking to trap people into loans with complicated wording and fine print that requires a trained eye to see. That’s why so many people got duped into thinking that they have received cheap money with little down payment when the reality is that loan trapped them into paying high interest payments. There is no exact estimate†¦show more content†¦If kids are taught how to manage their own money, they will have a higher standard of living, give them more independence and have the freedom to choose their path without worrying about financial handcuffs - student l oans, car payments, or even credit card debt. Last year, around 39% of 18 - 24-year-olds were enrolled in college, and about 1.8 million resided in on-campus dormitories. For many students, college is the first time that they can gain financial freedom from their parents. Some even carry the financial burden of paying for college out of their own pocket, paying thousands of dollars before they even complete their first year. The complexity of applying for student loans and managing debt can be made simpler if students are guided through the admissions process. On the other hand, some kids decide to skip out on college, around 60 percent of these students didn’t even apply to college at all! Those who enter the workforce straight after high school need extra assistance in filing their own taxes, balancing a check, and applying for their first credit card. Since no one is born understanding how to manage money, it’s important that they build a strong financial foundation for kids to learn at an earlier age because once the wrong habits are formed, they are hard to break. According to a recent survey by XXX REPORT only 26% of 13-21 year old surveyed recently said that theirShow MoreRelatedThe Financial Crises Of 20081701 Words   |  7 PagesPg.3). The Financial crises of 2008 has had a major impact on the lives of individuals, for some it has been beneficial for others dire. Many people no longer have faith in the ‘capitalism that presents itself as a gospel of salvation’ (comaroff review, find) and are embracing alternatives to lassaire faire capitalism. The crises has seen the rise of anti-capitalist movements such as ( people before profit) offering an alternative vision to mainstream capitalism. In the EU the crises has forced peopleRead MoreThe Financial Crisis Of The Decade1364 Words   |  6 PagesThe financial crisis of the decade is considered the largest and most severe compared to the Great Depression. The crises reshaped the financing and investment banking business not only in the United States but globally. The top largest banks have fallen due to the losses they have incurred in connection with their investments in the subprime mortgage markets. (Financial Crises 2007-2008 Overview) Governments had to come up with some solutions in order to further avert the decline of their countryRead MoreFinancial Crisis Essay1088 Words   |  5 Pagesinstitutional investors propagated the financial crises. Institutional investors, which is both, individual or companies do enjoy the benefits of reduced commission preferential regulations. This is due to their large and professional investments. Institutional investors like the mutual funds, pension funds, hedge funds like Magnetar Capital, and Life insurance companies like the AIG and investments trusts contributed to the global financial crises of 2007-2008. This financial crisis also referred to as theRead MoreThe Financial Crisis Of 20071646 Words   |  7 PagesThe most recent financial crisis of 2007 was felt throughout the world, and brought about huge economic consequences that are still being felt to this day. Within the United States, the crisis undoubtedly resulted in a surge in poverty and unemployment, a signif icant drop in consumption, and the loss of trust in the capitalist economic system. Because of globalization, this crisis was felt through the intertwined global markets, affecting underdeveloped countries even more. Historical eventsRead MoreBanks Ceo Incentives and Credit Crisis1603 Words   |  7 Pagesincentives.This collapse had a cascading effect on the entire major financial or credit market across the world. In this downfall, many of the financial services providers like Goldmansach , Royal Bank of Scotland and Lehman Brothers have reported bankruptcy on the heels of severe losses in their mortgages. Many of the researcher and scholarsVarious scholars such as XXXXXX have debated the have mentioned various reasons for the 2008 financial crisis, but the uppera significant factor that many most reasonRead MoreFinancial Crisis : Fiscal Crisis1542 Words   |  7 PagesFinancial Crisis: 2008-2009 In early 2000s, most private and public budgets in the U.S. were funded through local and sovereign debts. In this regard, staggering mortgage industry, weak fiscal policies, and unscrupulous financial investors principally contributed to the 2008-2009 financial crises. Due to surging inflation and accumulated interests, most borrowers failed to payback their loans due to continued bankruptcy. Consequently, interest rates in various countries were adjusted to balance theRead MoreFinancial Crises And Its Effects On Global Economic Crisis1068 Words   |  5 PagesThe 2007-2008 Financial Crisis- Its Causes and the Involvement of the FED The financial crises that occurred in 2007-2008 had such a big impact on the world that it is now considered a global financial crisis (GFC) or global economic crisis. It is commonly believed that it began in July 2007 with the credit crunch; U.S. investors lost trust in the value of subprime mortgages which caused a liquidity crisis. This had the effect that the U.S. Federal Bank injected a large amount of capital into theRead MoreRelationship between Inequality and Financial Crisis Essay913 Words   |  4 PagesRelationship between inequality and financial crisis The most recent global crisis has rejuvenated interest in the relationship between inequality, credit booms, and financial calamities. Many analysts propose that rising levels of inequality led to a credit boom and eventually to a financial crisis. Others, however, have distanced themselves from that notion arguing that while inequality can be blamed for many things, the global crisis may not be one of them. In deriving a personal stand regardingRead MoreAnalysis of â€Å"the Global Financial Crisis: Causes, Effects, Policies and Prospects† Dominick Salvatore, Journal of Politics Society, Columbia University1110 Words   |  5 Pages Analysis of â€Å"The Global Financial Crisis: Causes, Effects, Policies and Prospects† Dominick Salvatore, Journal of Politics Society, Columbia University June 2010 Marija Nikolic December 2012 Global financial crises has brought into focus debate about decisions made by the countries which are leading economic forces, making them to reconsider past living standards and habits. With the aim to examine the causes, effects, policies and prospects for the financial crisis D.Salvatore publishedRead MoreAlexander Hamilton Proposed Using A Banking System1707 Words   |  7 Pagesis a debate on if there should be more or fewer regulations on banking. The Great Depression is a large reason for the beginning of many banking regulations. Many believe that the banking and financial crises were a large contributor to how the Great Depression went down, especially the three banking crises that hit the United States during that time. The first panic happened in October of 1930, the second in March of 1931, and the third began at the end of 1932. Because of all this, different reforms