Reasons for Cyber-Attacks in Businesses
Question:
Discuss about the benefits of the IT on business and the impact of the IT on a business of Yahoo.
Information Technology has helped in various sectors and businesses all over the world. The impact of IT on businesses have been focused in this report. This report describes various case studies and recent news related to the IT security breaches in various businesses. The use of IT has helped in providing quality web services to the customers in the market.
This report outlines various reasons for the cyber-attacks in the businesses all over the world. A proper analysis of theoretical and practical knowledge has been done in the report. The impact of these attacks on the business has been focused on this report. Some recommendations are provided for mitigating these challenges and impacts on the business.
Information Technology has been rationalizing various business all over the world. This has helped in maintaining a technical prospect of business in the market This report focuses on Yahoo Company and analyses impact of IT on its business. However, Yahoo is web services Provider Company under Verizon Communications through Oath Inc. The company have successfully maintained its services all around the world [1]. The use of the cloud services by the company has helped in providing mail and storage services by the company The web services of the company have been enhanced by the use of the cloud services. The use of cloud computing in the business has helped in providing efficient web services to customers all over the world. Therefore, an enhanced web services have been provided to the customer that increases customer satisfaction level in the market[2]. In 2015, IT Security Risks survey report that IT specialists have started to take the cyber threat more seriously than last year. The last year was full of security breaches and APT announcements. However, 50% of IT professionals have listed protection of security breaches as one of the three major concerns. Therefore, use of IT in the business has helped in maintaining a competitive advantage in the market for Yahoo. A proper management of resources has been done in the yahoo with the use of IT in the business. The use of IT in business performs several tasks including enhancing the performance of systems and security of data and information in the database.
The trend of Bring Your Own Device (BYOD) has increased employee satisfaction level. Different business is adopting this technique for maintaining proper approach towards business in the market. The use of the mobile technology has helped in providing the increment in productivity of company in the market[3]. Use of IT technology in the market has helped in protecting data and information of users and employees of the company. Use of the antivirus and firewalls helps in maintaining the security of data and information in the database. This helps in restricting viruses from entering into the server and network of the company the IT has helped in increasing the customer base of the company in the market. The social media marketing has helped in enlarging the customer base by reaching out to the maximum number of people in the market at a time. This helps in maintaining the profit of the company in the market. Therefore, information technology has helped in satisfying the maximum number of customers in the market by fulfilling their needs and expectations from the company. The security protocols of a company have been increased by the use of the internet technology in the company. The concept of data centralization has been initiated by the use of the information technology in the company [4]. The use of the data centralization has helped in improvising searching technique of data and information in the market. Various data searching technique has been enhanced in this process and speed of searching and transferring data and information. The company uses a secured browser that helps in protecting it from harmful viruses and malware entering into server and network of the company.
Enhancement of Web Services by the Use of Cloud Services
Data collection and storing technique of the company have been enriched with various techniques. The operational function and model of the company have been changed with the involvement of information technology in the business [5]. The advertising and marketing strategy of the company has been enhanced by the use of information technology by the company. Extension of business in the market has been possible by enhancing the social media marketing and advertisement of web services provided by the Yahoo[6]. The company have successfully utilized benefits of the information technology. The company have ability to create the mobile application of Yahoo that has maximized traffic on the website of Yahoo. The ease of using web services from Yahoo has been smoothening by the use of the mobile application. Customers and clients can connect with the company easily and provide their feedback regarding web services provided by this company. The cloud computing has helped in using the cloud storage services for the customers to store their data and documents over the internet. The cloud computing has helped in maintaining the resources of the company in the market. The security of data and information over the internet have been increased with the use of security protocol[7]. The private cloud was able to provide the highest security among all different types of cloud[8]. Therefore, most of the organization have focused on implementing strategies for improving the security of information and data.
However, along with its positive impacts on business, there are negative impacts also prevailing in the business. Information Technology has negatively affected many businesses all over the world[9]. The use of IT in business have increased cyber-attacks and other illegal activities. Yahoo has also been suffered from these cyber-attacks. Various illegal activates including data breach, cyber-bullying cyber-attacks and phishing have been creating a lot of damage to a business. In September 2016, search engine, email provider and one-time Google rival Yahoo was hit by massive cyber-attack described as the biggest data breach in history. Approximately 500 million customers have been affected by this attack. Their personal data including names, addresses, email phone numbers and passwords are being breached by the hackers[10]. These attacks have deleted the brand image of a company in the market. Millions of people were in the loss including the company. The use of the personal data and information have been breached from the online server. Different sensitive contacts and information have been breached from the company databases. This has created a massive loss to the company and the customers of the company[11]. Clients and customers are not happy. There have been loopholes and gaps in their security protocol of the company. The chief IT officer of company has admitted their fault. The gaps in the security protocol have been resolved properly for minimizing any future cyber-attacks over the internet the brand image of the company have been damaged by these attacks.
Conclusion
It can be concluded that the Information Technology has greatly affected the business of various company including Yahoo. The use of the IT has helped in enhancing the performance of the business. Cloud Computing has helped in minimizing the cost of resources of a company. Cloud Computing has provided various resources for enhancing the performance of the company. However, there have been cyber-attacks over the internet. Yahoo has faced the biggest data breach attack in the history. 500 million users and clients have been affected due to this attack. Personal data and information. Therefore, the company have looked up for loopholes and gaps in the security protocol of the company. Restriction of harmful virus and malware have been reduced by increasing the security of the protocol of the company.
The Trend of Bring Your Own Device (BYOD) and Mobile Technology
It recommended that the company have to prepare various strategies for mitigating these IT challenges in the company. The company have to install updated antivirus and firewalls that help in restricting harmful malware and viruses from entering into the server of the company. The databases are being enriched with various protocols or ensuring the security of data and information of users and clients. Yahoo needs to restrict interference of the third party in the network and database of the company. The company needs to provide strong passwords in a server of the company. Passwords need to be at least 8 characters long with a complex combination of letters, characters and symbols. This help in creating complex passwords for restricting third-party users from accessing the server and database. This might help in maintaining and monitoring the security of data and information of users and clients. The use of the Virtual private network (VPN) might help in monitoring network and server of a company over the internet. It helps in hiding the IP address of the computer system and server through which they are connected. Therefore, a false IP address is generated and the hackers are not able to hack the server and network.
References
Coffee Jr, John C., Hillary Sale, and M. Todd Henderson. “Securities regulation: Cases and materials.” (2015).
Chang, Victor, Yen-Hung Kuo, and Muthu Ramachandran. “Cloud computing adoption framework: A security framework for business clouds.” Future Generation Computer Systems57 (2016): 24-41.
Peltier, Thomas R. Information security fundamentals. CRC Press, 2013.
Ward, John. Keeping the family business healthy: How to plan for continuing growth, profitability, and family leadership. Springer, 2016.
Ward, John. Keeping the family business healthy: How to plan for continuing growth, profitability, and family leadership. Springer, 2016.
Michalos, Alex C. “The impact of trust on business, international security and the quality of life.” How Good Policies and Business Ethics Enhance Good Quality of Life. Springer, Cham, 2017. 127-153.
Ortmeier, Patrick J. Introduction to Security. Pearson, 2017.
Hornuf, Lars, and Armin Schwienbacher. “Should securities regulation promote equity crowdfunding?.” Small Business Economics 49.3 (2017): 579-593.
Luna-Reyes, Luis Felipe, et al. “Collaborative cross-border security infrastructure and systems: Identifying policy, managerial and technological challenges.” Remote Work and Collaboration: Breakthroughs in Research and Practice. IGI Global, 2017. 640-658.
?mrohoro?lu, Ay?e, and Kai Zhao. “Intergenerational transfers and China’s social security reform.” The Journal of the Economics of Ageing (2017).
Lederer, Matthias, Matthias Kurz, and Pavlin Lazarov. “Usage and Suitability of Methods for Strategic Business Process Initiatives: A Multi Case Study Research.” International Journal of Productivity Management and Assessment Technologies (IJPMAT) 5.1 (2017): 40-51.
“The 10 Biggest Security Incidents Of 2016.” Welivesecurity, 2017, https://www.welivesecurity.com/2016/12/30/biggest-security-incidents-2016/.
Coffee Jr, John C., Hillary Sale, and M. Todd Henderson. “Securities Regulation: Cases and materials.” (2015)
Chang, Victor, Yen-Hung Kuo, and Muthu Ramachandran. “Cloud computing adoption framework: A security framework for business clouds.” Future Generation Computer Systems57 (2016): 24-41
Lederer, Matthias, Matthias Kurz, and Pavlin Lazarov. “Usage and Suitability of Methods for Strategic Business Process Initiatives: A Multi-Case Study Research.” International Journal of Productivity Management and Assessment Technologies (IJPMAT) 5.1 (2017): 40-51
Peltier, Thomas R. Information security fundamentals. CRC Press, 2013.
?mrohoro?lu, Ay?e, and Kai Zhao. “Intergenerational transfers and China’s social security reform.” The Journal of the Economics of Ageing (2017).
Ward, John. Keeping the family business healthy: How to plan for continuing growth, profitability, and family leadership. Springer, 2016.
Michalos, Alex C. “The impact of trust on business, international security and the quality of life.” How Good Policies and Business Ethics Enhance Good Quality of Life. Springer, Cham, 2017. 127-153.
?mrohoro?lu, Ay?e, and Kai Zhao. “Intergenerational transfers and China’s social security reform.” The Journal of the Economics of Ageing (2017).
Ortmeier, Patrick J. Introduction to Security. Pearson, 2017.
“The 10 Biggest Security Incidents Of 2016.” Welivesecurity, 2017, https://www.welivesecurity.com/2016/12/30/biggest-security-incidents-2016/.
Hornuf, Lars, and Armin Schwienbacher. “Should securities regulation promote equity crowdfunding?.” Small Business Economics 49.3 (2017): 579-593