The Deloitte Cyberattack and Response Analysis Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

It is significant to note that cyber dangers are growing in importance as a result of technical improvements and the reliance of contemporary firms, like Deloitte, on hackable and exposed communication tools. Since the company’s primary source of income is cybersecurity consultancy, its reputation will suffer the most. In other words, even though the hacking may directly affect operations and cause disruptions to the business as well as the recovery of stolen data, all of these effects are ultimately repairable and reversible, while the reputational damage will not only have a short-term impact but will also be reflected in future deals.

Deloitte’s response to the situation can be considered to be reasonable and effective because it was able to prevent reputational damage by keeping the breach of the attack a secret. The business succeeded well in that it avoided adopting collective crisis accommodating measures and instead concentrated on non-expositional ways of data containment. To reduce the likelihood of reputational harm, Deloitte only informed top and senior managers and promptly got in touch with them directly informed affected clients.

In other words, the reputational damage is greater when a company in crisis employs accommodating strategies, such as exposing itself to the public and being excessively transparent about the specifics of the issue, than it would be if it stuck to defensive strategies and limited forms of communication. The business should have instead strengthened its internal security analyst’s team by extending the relevant department to assure future preparation instead of recruiting external specialists, which has the potential to cause information breaches.

The first top priority is the urgent inclusion of a multistep verification mechanism for administrative emails and other communication channels. The lack of serious security measures for the internal communication channels was the primary cause of the attack. It is significant to highlight that the hacker or hackers did not cause the significant losses and damages that they could have. Second, the company’s internal communication network must be completely redesigned. One communication channel, corporate email, was used to convey all sensitive information. This weakness must be fixed by establishing some highly secure communication channels that are distinct from one another and utilized for various reasons. The third priority should be investing in and expanding the security analyst and expert team for the company lives up to its supposed expert position in the security

Reference

Krebs, B. (2017). Source: Deloitte breach affected all company email, and admin accounts.

Print
More related papers
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2023, August 27). The Deloitte Cyberattack and Response Analysis. https://ivypanda.com/essays/the-deloitte-cyberattack-and-response-analysis/

Work Cited

"The Deloitte Cyberattack and Response Analysis." IvyPanda, 27 Aug. 2023, ivypanda.com/essays/the-deloitte-cyberattack-and-response-analysis/.

References

IvyPanda. (2023) 'The Deloitte Cyberattack and Response Analysis'. 27 August.

References

IvyPanda. 2023. "The Deloitte Cyberattack and Response Analysis." August 27, 2023. https://ivypanda.com/essays/the-deloitte-cyberattack-and-response-analysis/.

1. IvyPanda. "The Deloitte Cyberattack and Response Analysis." August 27, 2023. https://ivypanda.com/essays/the-deloitte-cyberattack-and-response-analysis/.


Bibliography


IvyPanda. "The Deloitte Cyberattack and Response Analysis." August 27, 2023. https://ivypanda.com/essays/the-deloitte-cyberattack-and-response-analysis/.

Powered by CiteTotal, automatic reference maker
If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Cite
Print
1 / 1