CYBER SECURITY ISSUES Cyber security issues that Alsager Ltd. faces When modernizing Alsager Ltd.'s IT structures, despite the numerous advantages that the new systems bring, it is necessary to be aware of the possible threats they pose. The virus can affect your system. They are pieces of code created by hackers to inconvenience and, in the extreme, corrupt valuable data. Examples of these can be animated icons flying in front of the computer screen, and at the other extreme, it can be programs designed to delete the hard drive. Computer virus can be caught in several ways. The most advertised way is via the Internet, other ways are via removable storage media, such as floppy disks and zip drives. They can also be caught across computer networks, where a third party from another machine on the network introduces the virus (accidentally or otherwise) which then spreads throughout the network. The most unlikely way of contaminating the system with viruses is through malicious employees creating them on the system, but this will be discussed later. There are a number of precautions that can be taken to help prevent this. Simply forcing employees not to use mobile storage media unless they know where they have been, making them aware that pirated media and shareware/freeware programs can be potentially dangerous. A talk and the distribution of flyers to employees could be useful. If the Alsager decided to connect to the Internet, this would be another potential source of viruses and the like. You can place a firewall on your system to prevent infection. A more immediate way to prevent viruses is to subscribe to an antivirus program, although this will not guarantee you 100% protection but it will help prevent most known viruses. An important note at this point is the importance of receiving regular antivirus updates from your software manufacturer. With the introduction of IT facilities, the amount of information occupied in the room is drastically reduced, from an entire filing cabinet to a small hard drive. Information can be easily copied and since the advent of the Internet it is no longer necessary for the information to be on a psychic medium to leave the building. This then makes it much easier to copy and extract valuable information. All details of the companies, their accounts and the accounts of their customers are subject to risk. A single person can extract all the information onto a zip disk or even a floppy disk, depending on the size of the file.
tags