Chat with us, powered by LiveChat Write a thread containing a thoughtf | Writedemy

Write a thread containing a thoughtf

Write a thread containing a thoughtf

Write a thread containing a thoughtful answer to 1 question.  Answer should  contain at least 400 words.  If necessary, you may list within your  thread any concepts on which you need further clarification as well.   Also, you must reply to at least 2 threads below.  Each reply  should contain at least 200 words.  Additionally, all posts  (thread and replies) should reflect professional writing, current APA  standards, include at least 1 scholarly reference (e.g., peer-reviewed  journal articles), and integration of at least 1 biblical principle.

Thread Question: (in 400 words at least)

How would you respond to a small business owner who believes that  his/her business is less likely to be attacked precisely because it is  so small?

Replies(Reply to each thread in at least 200 words EACH)

Thread #1

Organizations  today are utilizing the newest and greatest technology there is to  offer. This is to ensure that they keep a competitive edge with other  organizations within a similar market, as well as, have several  resources available to the IT staff in the event of an issue.  However,  it has been found that when these new technologies are implemented  employees may not be receiving the proper training. This then leads to  employees trying to install software that they are familiar with on to  their company owned system to keep up with production. This should not  be permitted on any company owned systems for various reasons. According  to Miller (2017), the majority of software used today requires some  sort of patching to fix bugs and security holes along with updates to  aid in improving performance. If an employee downloads unauthorized  software, the IT department has no way of tracking it to ensure the  appropriate updates are happening. Miller (2017) stated that employees  may mistakenly download a virus or malware by downloading malicious  software from the internet. This then leads to a delay in production  from the employee as well as possible unwanted expenses. Downloading  unauthorized software can also lead to complications if the employee  needs assistance with a problem within the software. Miller (2017)  stated that if an employee runs into a problem with an unauthorized  cloud spreadsheet application, such as a corruption, the IT staff or  vendor may try and help but they cannot guarantee that the issue will be  resolved. As a result of this, the employee may have lost vital company  data. Miller (2017) stated that by utilizing unauthorized software, the  employee is more than likely not backing up data on the software or if  it can even be restored after it is lost. Again, this is something that  needs to be monitored by the IT staff or chosen vendor. Another issue  presented by Miller (2017) was if an employee installed new software  onto an older machine that wasn’t meant to handle that software, you  could potentially break the system. As a result, the IT staff is  overwhelmed with trying to make repairs to that device. This again leads  to unexpected expenses for the organization.

Another issue that can arise with employees installing unauthorized  software is how do you know that employee isn’t trying to corrupt the  system or aiding someone who else with the same vendetta. With only  authorized access granted to employees, it is easier to track who  allowed the breach to occur and track if any sensitive data has been  release (Miller, 2017). It is important that your department creates a  policy and ensures that all employees follow it accordingly. “Remind the  people to be subject to rulers and authorities, to be obedient, to be  ready to do whatever is good.” (Titus 3:1, New International Version)

Thread #2

Small Business: Big Losses

I would say it is quite the opposite. The likelihood of being  attacked can include a range of different reasons, but in the event that  an attack does happen, your livelihood and the livelihood of your  employees could be completely ruined. “Microsoft estimates that 20% of  small businesses have been victims of some form of cybercrime while  semantics suggests that 43% of the cyber-attacks during 2015 were  against small businesses.” (Berry & Berry, 2018). The statistics to  disprove that statement are readily available on the Internet that is so  important to a small business.

I know a small company doesn’t have the resources, time or  manpower to devote to cyber attacks, but there are other ways to secure  your personnel and assets without having to devote all of those things.  Applications like Comodo, ESET and many others can be used for free or  relatively cheap. These options can provide cost-effective security  solutions to help protect everything from financial records to employee  information.

Another reason that a small business should protect their digital  information is that it is required by law. All retailers that accept  major debit/credit cards have to adhere to the Payment Card Industry  Data Security Standard (PCI DSS). This standard outlines details on what  and how information must be protected by a business, the actions  required to protect customer information and the actions required if a  breach of information does occur. Having to deal with unhappy customers  because of a data breach is the least of your worries though. According  to Miteva at MyMoid.com, fines for non-compliance can range from $5,000  to $100,000 dollars depending on the size and severity of the issue  (2017). Having to deduct even $5,000 of monthly income from most small  businesses would be enough to force them to close their doors.  Details regarding the most current version of the Payment Card Industry Data Security Standard can be found at https://www.pcisecuritystandards.org/document_library?category=sware_sec#results.

While the Internet has provided us with an endless amount of ways  to advertise and better our small businesses, don’t let the World Wide  Web be the reason your small business doesn’t reach its full potential.  With all the low-cost choices on the web, choose one that accomplishes  what your company needs, and get your business PCI DSS compliant. Do not  let your business fall prey to the idea that no one will notice your  small business.

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order