In: Accounting
Any organisation using IT can be exposed to cyber risks that have the potential to cause significant financial loss and damage to reputation.
Required:
a) Evaluate the various cyber risks that the company you work for may be subjected to and if you are not currently employed then evaluate the cyber risks that Unisa as an organisation could face.
b) Recommend methods of protecting against these risks identified in a) above. (10 marks
Meanwhile the modern society wherever the market is encouraged to a large amount via Information and technology (IT) operations. This befalls with both advantages also dangers. Each business which utilizes IT is subjected to may sort of danger especially with regard to consumer data.
Any IT Risk whichever business face do as regards
1. Electronic warning: Beneath this hacker or Character with illegal purpose plan to settle the business IT operation. There are several methods to achieve this alike a Phishing strike or infecting system including virus-like ransomware.
2. Physical warnings: Aforementioned could be from both people and environment. Under the Physical threat, the IT system gets destroyed due to flood or by a Panic assault.
3. Technological breakdowns: when the IT operation is not operating like due to software crackup or computer Hardware malfunction. For case, if the IT Server crashes the entire flow of data linking business or outlets attached to that server gets weakened and eventually the company will suffer the loss of support or loss of business.
4. Infrastructure crashes: Infrastructure like the quantity of Internet service or power fails later it be hard for companies to continue its assistance or product.
5. Human Failure: Aforementionedwill be similar an operator deletes the business-critical information by slip or does not obey the rule of methods established for IT maintenance by the business.
Methods to retain the danger beneath an adequate level are as given below :
A. Danger Estimation by Convoying IT Review by expert in sequence to get highlighted the unsafe IT area which asks for development or more suited guards.
B. Assuring the maintenance of important foundation assistance by hiring services of merchant which produce regular services like internet service provider by least downtime furthermore great track report. Design of power alternate in case of power breakdown.
C. Instructing to the employee regarding the most advanced warning in IT environment plus how to safeguard the company from so pranks and threats.
D. Performing the antivirus also additional important security software to protect the data of company and its client.
E. Running view by devices like a server for the continuity of procedure in case of mechanical breakdown. Hardware should be bought from a merchant that produces more loyal after-sale assistance.
Termination:
IT is the necessity of the moment and business can not withdraw utilizing IT as here the age of technology which helps the sales to increase and help the client fine but at the same time sales should take care of IT danger also employee suitable guard.