The Impact Of Cyber Attacks On Technology

1760 Words Dec 13th, 2015 8 Pages
1 Everyday we see innovations, new technology in the market, updates, upgrades. The world is moving forward and it is moving rapidly. Businesses around the globe are becoming more dependent on an ever-increasing selection of IT systems and technologies more and more as time goes on. Furthermore, they need to be interconnected with their suppliers, venders, customers and business partners. The dependency on technology combined with interconnection of their business and rapid increase has increased the potential of cyber security risks. Cyber attacks are not just an IT problem; they are more a business risk. Hacking has evolved from hackers to hack for fun to just look for technical vulnerabilities to being sponsored attacks
…show more content…
It is like giving free pass to hackers to come and take whatever they can get and leave without having any investment on security infrastructure.
2 This is not about succeeding over companies because we have not got hacked. It is about serving the attack and how much we can defend this companies data from the wrong people. It is about maintaining this companies credit brand name. There is no saying that this company has not been hacked or is under attack as we speak. Good Hackers can go undetected take whatever they can take or plant any bugs they want without us knowing until it is too late. We should be different from other companies, and we should be the examples for other companies of how we priorities our cyber security infrastructure.
3 What is cyber security? In simple words cyber security is a preventative method of technologies, process and practices designed to protect networks, computers, programs and data from attack, damage, unauthorized access, stolen, and vulnerabilities. To get a deeper meaning of cyber security we need to break it down and the methods that goes with it. Cyber security is “collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.” ( These actions are done by a hacker,
Open Document