No matter the size of the business, computer security must be a high priority to management. As discussed in Chapter 5, IT-related risks include the failure of IT systems and processes to meet government rules and regulations, security risks from hackers and denial-of-service attacks, and privacy risks from identity theft. It is essential businesses have good internal controls to avoid the IT-related risks.
Hackers are focusing on small companies as a target due to the lack of technical expertise and weak security systems. In 2010, the U.S. Secret Service responded to 761 data breaches, 63% were at companies will less than 100 employees. It is much more difficult and time-consuming for hackers to break into large multinational companies due to the extensive security of their IT infrastructure. Most small businesses have extremely weak systems because owners and managers don't believe they would ever be victim to hacking due to the size of the organization. Online banking log in information is being stolen by companies, computerized cash registers are being hacked resulting in thousands of dollars worth of fraudulent charges on customer credit cards. These events can quickly diminish a small business. Not only do these events create a bad reputation for the company because customers will no longer feel safe purchasing items, but the amount of money lost from the hacking alone can cause bankruptcy.
Smaller companies need to do a better job of protecting themselves. As stated in the article I read, smaller companies are less likely to grasp the security threat. Businesses with a lack of basic security requirements makes it very easy for hackers to break the system. A simple and quick search by hackers on the Internet shows them which businesses have computers configured in such a way where hacking is effortless. Technology must be improved for security purposes, making sure a high-grade firewall is installed to protect the business.
http://online.wsj.com/article/SB10001424052702304567604576454173706460768.html?mod=WSJ_Tech_LEFTTopNew
No comments:
Post a Comment