Cybersecurity, Ethics, and Privacy in the Global Business Environment Essay

Exclusively available on Available only on IvyPanda® Written by Human No AI

Introduction

In the context of present-day developments, a business cannot achieve high results without IT and digital technologies. If enterprises do not implement the recent innovations in the field, it will lead to inefficiency and economic impracticality (Rainer & Prince, 2019). Therefore, the modern business environment is dependent on IT technologies, and, consequently, it is extremely vulnerable to various cyber threats (Rainer & Prince, 2019). Therefore, the purpose of this paper is to cover the types of possible threats and mitigation methods, explain the importance of a continuity plan, and outline ethical and privacy concerns for organizations.

Types of Threats and the Ways of Mitigation

There are numerous types of cyberthreats, and the number of different options is increasing rapidly. All of them may be separated in unintentional and deliberate, and threats may be released by various methods (Bellanova & González Fuster, 2019). First of all, hackers may stick to the approach of social engineering, which implies posing a threat via the employees of an organization (Bellanova & González Fuster, 2019). For instance, it has become a common sight for people to receive a phone call from a bank employee who asks the client to confirm a monetary transaction. In case people reveal their personal and private data, they are despoiled. In order to provide security in these situations, it is essential to inform the customers of the correct behavior in case of phone calls from the bank. Furthermore, businesses implement additional checks of identification for monetary transactions.

Another widely spread method is brute force, which is applied whether an enterprise has a security system of high quality, as it is extremely difficult to reach the data via other means. Using special software, malefactors successively attempt to guess the password by applying all the possible options (Bellanova & González Fuster, 2019). The only effective way of mitigating this threat implies the constant renewal of access codes and passwords. In addition, a sufficient solution could be the implementation of programs that monitor the attempts to enter the system and the time when they were made.

Moreover, these days, software viruses appear to be a popular form of cyber attack. The example of these viruses are cbf, chip dale, just, foxmail inbox com, watnik91 aol com (Bellanova & González Fuster, 2019). They codify data, which is stored in photographs, appliances, electronic tables, and files (Bellanova & González Fuster, 2019). Companies, which have encountered such threats, are offered to return the data in exchange for a significant sum of money. Frequently, malefactors ask to give the sum for the information in bitcoins. However, it is a common sight that organizations are not capable of interpreting the figures after paying the attackers. In order to protect a business from these situations, it is essential to adhere to data backup, implementation of appropriate anti-virus software, and renewal it on a regular basis. Furthermore, it is highly recommended to supply the employees with necessary information on digital security.

The Continuity Plan

A continuity plan for business implies performing essential protective functions and measures which prevent data from various cyberthreats. Therefore, the primary consideration for this approach involves preparedness for disastrous situations (Phillips, R. & Tanner, 2019). In case an organization is capable of responding to the emergency rapidly and correctly, the negative consequences may be minimized or avoided (Phillips, R. & Tanner, 2019). The continuity plan should include necessary practical steps in case of cyber threats, which lead to the reconstruction of the operation of a company (Phillips, R. & Tanner, 2019). For this reason, the significance of continuity planning in the context of cybersecurity should not be underestimated.

Ethical and Privacy Concerns for an Organization

Today, organizations may store a significant amount of data about their clients. Therefore, in case the information is stolen, some personal figures may be revealed without the willingness of a customer, which presents an ethical concern (Phillips, R. & Tanner, 2019). In addition, the stolen data may be used in a way that is harmful to a person. An illustrative example could be the case of a phone call from a bank, which has been described earlier. Furthermore, organizations may own private information, which customers resent sharing. For instance, hotels may store information about a client’s transportation, leisure time activities, and location. In case the guest is a famous person, the publication of these figures may violate his or her life for privacy. Therefore, cyber-attacks may pose ethical and private concerns for the customers of an organization.

Conclusion

Today, business and digital technologies are closely connected, and it is impossible to respond to the customers’ needs without their implementation. Although modern innovations are associated with considerable advantages, which improve the operation of a business, there are serious drawbacks. Namely, the business environment appears to be extremely vulnerable to cyberattacks, which are dangerous for their negative consequences in numerous aspects. It may have a significant impact on clients’ well-being and the operation of enterprises. For this reason, in the context of present-day developments, the importance of preventative measures and awareness of cybersecurity should not be underestimated.

References

Bellanova, R. & González Fuster, G. (2019). Composting and computing: On digital security compositions. European Journal of International Security, 4(3), 345-365. doi:10.1017/eis.2019.18

Phillips, R. & Tanner, B. (2019). Breaking down silos between business continuity and cyber security. Journal of Business Continuity & Emergency Planning, 12(3), 224-232.

Rainer, R. K. & Prince, B. (2019). Introduction to information systems, 8th edition. Wiley.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, October 27). Cybersecurity, Ethics, and Privacy in the Global Business Environment. https://ivypanda.com/essays/cybersecurity-ethics-and-privacy-in-the-global-business-environment/

Work Cited

"Cybersecurity, Ethics, and Privacy in the Global Business Environment." IvyPanda, 27 Oct. 2022, ivypanda.com/essays/cybersecurity-ethics-and-privacy-in-the-global-business-environment/.

References

IvyPanda. (2022) 'Cybersecurity, Ethics, and Privacy in the Global Business Environment'. 27 October.

References

IvyPanda. 2022. "Cybersecurity, Ethics, and Privacy in the Global Business Environment." October 27, 2022. https://ivypanda.com/essays/cybersecurity-ethics-and-privacy-in-the-global-business-environment/.

1. IvyPanda. "Cybersecurity, Ethics, and Privacy in the Global Business Environment." October 27, 2022. https://ivypanda.com/essays/cybersecurity-ethics-and-privacy-in-the-global-business-environment/.


Bibliography


IvyPanda. "Cybersecurity, Ethics, and Privacy in the Global Business Environment." October 27, 2022. https://ivypanda.com/essays/cybersecurity-ethics-and-privacy-in-the-global-business-environment/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1