Monday, October 26, 2015

Common Information Security Threats in Business

Threats to information security
Information security threats include malicious software, stolen laptops or mobile devices, unsecured wireless internet networks, phishing and intruder/insider employee threat. Malicious software includes worms, spyware, viruses and Trojan horse. The malicious software is secretly installed in the network or computers in the organization and cause internal damage to information by deleting or corrupting it. The malicious software extracts information such as passwords and other sensitive information from the organization and uses this information for financial gains such as extortion or theft (Sanchez, 2015). Malicious software scan also leads to the breakdown of the entire computer network within the organization.
Stolen mobile devices and laptops are another major threat to information security. Once the laptops or the mobile devices have been stolen the information from them can be accessed. Laptops hold valuable and sensitive information and, therefore, leading to the theft of information (Teixeira, 2007).
Unsecured wireless internet connections provide hackers with an open door to enter the system. Hackers can easily enter the system through the wireless internet network and steal valuable information regarding the organization, its clients or its employees (Teixeira, 2007). The unsecured network gives hackers and easy access the system from outside the organization easily.
Phishing is the process whereby e-mails are sent disguised to seem like those from an authorized party in the attempt to gain confidential information such as administrative passwords from employees in the organization (Sanchez, 2015). Once the employee feeds the password to the link used in the e-mail, the hackers will immediately have the password necessary to enter the system. The employees must, therefore, be educated to understand the importance of protecting information from threats such as spear poising sent through emails.

Outsider or insider threat is also possible within the organization, outside parties may enter the organization steal the mobile devices or load up information in storage devices when not being monitored and walk away with it (Teixeira, 2007). Insider threats include disgruntled employee who is more dangerous than a hacker since they have access to the system and can delete or manipulate information at will causing damage to the organization.


References:
  1. Sanchez, M. (2015). The 10 most common security threats explained. blogs@Cisco - Cisco Blogs. Retrieved 25 October 2015, from http://blogs.cisco.com/smallbusiness/the-10-most-common-security-threats-explained
  2. Teixeira, R. (2007). Top Five Small Business Internet Security Threats. Small Business Trends. Retrieved 25 October 2015, from http://smallbiztrends.com/2007/06/top-five-small-business-internet-security-threats.html

No comments:

Post a Comment