An organisation’s staff is often its biggest security weakness.Employees will lose or accidentally expose data from time to time, and although staff awareness training will reduce the risk, it won’t eradicate the threat.
An organisation’s staff is often its biggest security weakness.Employees will lose or accidentally expose data from time to time, and although staff awareness training will reduce the risk, it won’t eradicate the threat.Tags: Essays About The SeafarerArgumentative Essay On Teenage PregnancyProblem Solving ExamGreat Essay ExamplesFreelance Writing Business PlanMiddle School Essay S In MarylandFind Good EssaysClement Greenberg Essay Abstract ExpressionismHow To Write A Composition Essay
If a sewage line is broken, the sanitary risk (not to mention the smell) could force the organisation to send its employees home. Systems crash, files are lost and documents go missing.
The whys of technological failures are so manifold and unpredictable that it’s impossible to anticipate how or when they will occur – just consider them an ever-present risk that will materialise at some point, so be ready for when they occur.
It’s primarily concerned with critical activities that, if disrupted, could immediately jeopardise your productivity or the availability of your services.
In that regard, it simply considers IT a critical resource for preserving those activities – in other words, a dependency.
The most frequent examples of cyber attacks include phishing emails (which are designed to steal information), brute-force attacks (in which crooks use automated software to crack an employee’s password) and ransomware (which locks down an organisation’s system until a fee is paid).
These are far from the only threats you need to plan for, though.
If a major road or rail network is shut down, you might be unable to receive deliveries, and employees and customers might not be able to reach you.
Other man-made disasters include oil spills, terrorist acts, industrial accidents and acts of war.
Humans inevitably make mistakes, and you need to be aware of that when planning for disruptions. This typically happens if they are disgruntled at work (maybe they were turned down for a promotion) or have left the organisation acrimoniously and their login credentials are still active.
There’s also the possibility that staff will simply be lured by the financial gain from stealing sensitive information and selling it on the dark web.