Free Essay SamplesAbout UsContact Us Order Now

Advice

0 / 5. 0

Words: 275

Pages: 1

91

Week 7 Advice
Student’s Name
Institutional Affiliation
The phishing scam is one of the popular cybersecurity issues that affect several organizations. To prevent falling trap of the fraud, organizations are required to implement techniques that make them less vulnerable. According to Newman (2010), one of the methods that can be applied is the installation of anti-phishing toolbars. The toolbars will conduct quick checks any time an employee visits a site and alerts them once anything malicious is detected. The toolbars will act as spam filters that will identify viruses and blank senders among other issues.
Demina and Chistova (2017) propose that the company can also encrypt all information that is sensitive and vulnerable to hackers. Encryption will ensure that no unauthorized personnel will gain access to the data. The company can also use firewalls to act as buffers between employees and intruders. The firewalls should be of two types, a network and desktop firewall, with the first one being a hardware option and the second a software. The other means which a company can keep off cybercrime is by updating all their security patches with the latest updates (Newman, 2010). When the system is up to date, the company will be informed of new phishing techniques thus ensuring their avoidance.
Employees should also be educated on the verification of a site’s security that will keep them from clicking on links that are mischievous. Before submitting any company’s information, employees should ensure that the site’s URL is secure.

Wait! Advice paper is just an example!

Lastly, the company can implement policies that deal with cybercrimes. The company’s strategy should include aspects such as collaboration with internet stakeholders, undertaking incident responses planning, ensuring that the policy covers data confidentiality, monitoring compliance, and having a proper disaster recovery plan (Brechbuhl et al., 2010). After formulating the system, the company should conduct an end user education. All employees should be educated about cybersecurity and the company’s strategies to make them aware of the consequences of not adhering to the set policies.
References
Brechbühl, H., Bruce, R., Dynes, S., & Johnson, M. E. (2010). Protecting critical information infrastructure: Developing a cybersecurity policy.
Demina, N. V., & Chistova, M. V. (2017). To the question on specifics of work on e-mails in terms of cybercrime prevention. Modern science, (1), 26-29.
Newman, G. R. “Cybercrime: Prevention of.” Encyclopedia of victimology and crime prevention. Los Angeles: Sage (2010).

Get quality help now

Aniya Weaver

5,0 (441 reviews)

Recent reviews about this Writer

First of all, I want to say that these guys have pretty affordable prices. I asked them to write a compare-and-contrast essay and was really impressed with the final cost and, what is even more important, the level of quality.

View profile

Related Essays

Cyberattack Brief

Pages: 1

(275 words)

Business Investments

Pages: 1

(275 words)

Business Communication Skill

Pages: 1

(275 words)

insuarance

Pages: 1

(275 words)

Business Management Couchsurfing

Pages: 1

(275 words)

Initial Elevator Pitch

Pages: 1

(275 words)

Phar-Mor

Pages: 1

(550 words)

Discusssion

Pages: 1

(275 words)