Question: QUESTION 1: Five Ways Hackers Can Get into Your Business Hackers don't care what size your business is; they only care if they can get

QUESTION 1: Five Ways Hackers Can Get into Your Business

Hackers don't care what size your business is; they only care if they can get past your defenses and relieve you of your valuables. Hackers actually like small businesses as they tend to have more to steal than an individual person but fewer cyber defenses than a large company. The hard reality is that most small businesses stand at least a 50-50 chance of being targeted for attack by hackers. Did you know Once every three minutes, the average company comes into contact with viruses and malware. One in every 291 email messages contains a virus. Three things hackers want most are customer data, intellectual property, and bank account information. The top five file names used in phishing scams are Details.zip., UPS_document.zip, DCIM.zip, Report.zip. and Scan.zip. The average annual cost of a cyberattack on a small or medium-sized business is $188,242.

Cyberthieves are always looking for new ways to gain access to your business data, business networks, and business applications. The best way to protect your business from cybertheft is to build a strong defense and be able to identify vulnerabilities and weak spots. The top five ways hackers will try to gain access to your businesses, according to John Brandon of Inc. magazine, are highlighted in Figure 4.17. (Please note that there are far more than five ways; these are just the five most common.)

Figure 4.17 Five Ways Hackers Gain Access to your Business WEAK PASSWORDS With a $300 graphics card, a hacker can run 420 billion simple, lowercase, eight character password combinations a minute. Cyberattacks involve weak passwords 80 percent of the time; 55 percent of people use one password for all logins. Hackers cracked 6.4 million Linkedin passwords and 1.5 million eHarmony passwords in separate attacks.

Your Best Defense: Use a unique password for each account. Aim for at least 20 characters and preferably gibberish, not real words. Insert special characters: @#$'&. Try a password manager such as LastPass or Dashlane.

MALWARE ATTACKSS An infected website, USB drive, or application delivers software that can capture keystrokes, passwords, and data. An 8 percent increase in malware attacks against small businesses occurs yearly; the average loss from a targeted attack was $92,000. Victims of infected mobile developers' website attacks include Apple, Facebook, and Twitter.

Your Best Defense: Run robust malware-detection software such as Norton Toolbar. Keep existing software updated. Use an IPhone; Android phones are targeted more than any other mobile operating system.

PHISHING EMAILS Bogus but official-looking emails prompt you to enter your password or click links to infected websites. A 125 percent rise in social media phishing attacks has occurred since 2012. Phishers steal $1 bilion from small businesses yearly. Many small businesses are targeted with phishing emails designed to look like Better Business Bureau warnings.

Your Best Defense: Keep existing software, operating systems, and browsers updated with the latest patches. Don't automatically click links in emails to external sites; retype the URL in your browser. SOCIAL ENGINEERING Think 21st-century con artist tactics; e.g., hackers pretending to be you to reset your passwords. Twenty-nine percent of all security breaches involve some form of social engineering. Average loss is $25,000 to $100,000 per incident. In 2009, social engineers posed as Coca-Cola's CEO, persuading an executive to open an email with software that infiltrated the company's network.

Your Best Defense: Rethink what you reveal on social media-it's all fodder for social engineers. Develop policies for handling sensitive requests such as password resets over the phone. Have a security audit done. RANSOMWARE Hackers hold your website hostage, often posting embarrassing content such as porn, until you pay a ransom. Five milion dollars is extorted each year. The real cost Is the data loss-paying the ransom doesn't mean you get your files back. Hackers locked the network at an Alabama ABC TV station, demanding a ransom to remove a red screen on every computer.

Your Best Defense: As with malware, do not click suspicious links or unknown websites. Regularly back up your data. Use software that specifically checks for new exploits."

Case Study 1: Five Ways Hackers Can Get into Your Business 1. Define information ethics and information security and explain whether they are important to help prevent hackers from gaining access to an organization. 2. Identify two e-policies that a business could implement to ensure the protection of sensitive corporate data from hackers. 3. Demonstrate how a business can use authentication and authorization technologies to prevent hackers from gaining access to organizational systems. 4. Analyse how a business can use prevention and resistance technologies to safeguard its employees from hackers and viruses. 5. Explain why hackers want to gain access to organizational data. 6. Evaluate additional ways hackers can gain access to organizational data.

QUESTION 2:

QUESTION 1: Five Ways Hackers Can Get into Your

Case Study 2: Snow Closure Downtown 1. How can a business continuity plan help a company prepare for disasters such as a snow storm? 2. Do you believe emergency communications are a critical part of a BDP plan?? 3. What types of new technologies could companies such as Amazon and Direct Fresh use to deliver packages during a disaster?

Snow Closure Downtown In Seattle, rain is not a problem, but snow is rare. The snow in Seattle finally began melting after 10 long days in February 2019, the snowiest February on record since 1916. The entire city came to a hard stop due to its steep hills and people unfamiliar with driving in snow. Seattle is home to such firms as Amazon and Microsoft, both hit hard by the unexpected fluffy white powder. For all the worry about artificial intelligence and robots replacing workers, it was surprising to see how many companies still heavily rely on people and applications to get from one place to another. Uber and Lyft had few available drivers even in the downtown area, where streets were being cleared. Amazon Fresh could not complete scheduled grocery deliveries. Amazon Prime Now orders could not be delivered. The hardest hit when the gig economy has this type of meltdown are the drivers and delivery people who are not getting paid unless they are working. Nowadays grocery chains try to use inventory management software to keep shelves stocked, but nothing could prepare local outlets for the storm panic shopping that cleared the aisles of staples such as milk, eggs, and bread and, strangely, celery. Social media, however, became increasingly useful for things like figuring out which stores had restocked their eggs (and celery) and which roads had been cleared, and to flag neighbors when Amazon Prime Now did open up a few more delivery slots. With classes in most school districts either canceled, starting late, or ending early for 7 days and day care centers closed as well, childcare matchmaking moved to social networks as well. Some parents were canceling nannies because they had to stay home anyhow; others were desperate for a sitter because their nanny couldn't drive in the snow. Help for an old neighbor who needs groceries or a pregnant woman who needs a prescription can easily be outsourced on Facebook neighborhood groups. Snow is not a big deal in colder climates, but for Seattle, it was an awakening to some of the weak and strong points of many of the applications and services that have transformed how we consume goods and information. The gig economy is not as robust as it seems when its operating environment is disrupted. On the other hand, the weather turned back the clock to a time before we realized social media were being used to hoover up our data without permission. It reminded me of how useful it can be for things like sharing information, taking photos of snowy landscapes, helping neighbors, and, yes, blowing off steam when you're stuck at home for days. Maybe Facebook should hold its next product planning meeting during a blizzard

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!