Save Draft or Publish Your Post
In this report it can be emphasized that being an ethics officer of an organization it is important to take necessary steps for the ethical issues that takes place in a business development. It can be stated that for the purpose of this report a newspaper article has been selected which has been related to the ethical issue that recently took place in the organization. It can be stated that every organization faces certain ethical issues however the issue that has been addressed here is cyber hacking in an organization. In a digital age the present and the future of an organization depends on the wide network of complex computer systems however the act of breaking into secure computer system creates misconduct in a business environment. In this report however emphasis has been laid on the issues on cyber hacking that took place in the organization and the impact it created on the business. The chosen organization is a telecommunication company which has been targeted by the occurrence of major cyber security issues which in the long run has affected many Australian businessmen.
It has been observed that the ethical issue that has recently occurred in the current business organization is associated with cyber hacking which largely effected the business of the firm. In a recent newspaper article published by The Guardian it has been established that in recent times hackers have been preying on small business firms rather than the large enterprises due to the reason that small business firms possesses less financial and human resources than that of big enterprises. It can be observed that innovative ideas in small firms can be changed rapidly which proved to be beneficial for the hackers in collecting the actual customer data and the other important resources of the firm.
Traditionally it was believed that small business enterprises possesses less threat compared to big companies of being hacked due to the reason of their size and resources however in modern world the situation is exactly the opposite. It has been stated that for the purpose of providing cyber security to the small enterprises the new European regulations aimed at protecting the customer data and with the advent of European new General Data Protection Regulation the protection of cyber security in organizations can be protected to some extent.
In a recent trend of technological development it has been observed that the cyber security of an organization also depends on the conduct of its employees due to reason that in recent trends the employees have taken active participation in hacking the internal data management of the organization. It can be stated that internal threat is more serious than external threat due to the reason that employees sometimes accidently or intentionally hacked the information security system of the organization by opening any email malware or by stealing sensitive information which directly links to the company security system.
In modern business organization it has been observed that the threats associated with cyber hacking are enormous as it can easily contribute to the downfall of an organization by causing massive loss to the reputation, damage on customer data and ultimately compel the organization to close down. It has been observed that business breakdown in recent world appeared to be most expensive and massive consequence of cyber crime causing enormous loss to revenue and information. It can be stated that it creates good business sense for the companies to ensure that their business is protected adequately. In many business enterprises there is a regulatory compliance issue and therefore it is important that the companies should have an idea about the regulations and their applications as well.
Thumbnail of Blog Post
The ethical issue which took place in the telecommunication company which is a small business enterprise created a major concern among the Board of Directors and as a ethical officer it is my duty to provide with ideas and take reasonable steps in order to eliminate the issue associated with cyber hacking. The major cyber threats that have been observed in the organization are associated with hack attack, human error and ransom ware. It has been observed that the human error that has been detected in this organization is associated with data breaches and as a result of which the useful information was lost and distributed by mistake to the wrong person. The hacker has targeted the company’s personally identifiable information of the customers especially on the credit card information. In context to this it has also been observed that a piece of malicious software has been detected which was received via phishing email has encrypted all the data on the company’s network
It has been stated that firstly in order to protect the business from cyber hacking it is necessary to educate the employees of the organization regarding the risk of cyber security because in general it is not possible to have a clear understanding of the concept of cyber security and the threats associated with cyber hacking. It is necessary that the employees of that organization be given proper training sessions in order to make them familiar with the security measures. In order to protect the cyber security system it is important to keep the software up to date in order to guard against the malicious threats keeping the infrastructure secure. It is important to develop a security policy of the organization by using unique and complex passwords maintaining a clean desk environment where there is no place for confidential and personal information.
In the conclusion it can be stated that cyber hacking as ethical issues has proved to be great hazard for many organizations in destroying the internal security system. The preparation of cyber security starts with the complete understanding of both the internal and external threats that can affect the cyber security system of a business and at the same time how hackers can exploit the system with different motives. It can lastly be stated that in order to protect the organization from the threat of cyber hacking it is important to form an idea of different cyber fraud schemes and their common threats.
References:
Broucek, V. and Turner, P., 2013. Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the ‘cloud’—a forensic computing perspective. Journal of Computer Virology and Hacking Techniques, 9(1), pp.27-33.
Denning, D.E., 2014. Framework and principles for active cyber defense. Computers & Security, 40, pp.108-113.
Feltham, M., 2017. Three things you need to know about cybersecurity and some recent regulatory changes in Australia trends and special topics. Governance Directions, 69(3), p.152.
Hopkins, N. (2017). Deloitte hit by cyber-attack revealing clients’ secret emails. [online] the Guardian. Available at: https://www.theguardian.com/business/2017/sep/25/deloitte-hit-by-cyber-attack-revealing-clients-secret-emails [Accessed 8 Dec. 2017].
Hutchings, A., Smith, R.G. and James, L., 2013. Cloud computing for small business: Criminal and security threats and prevention measures. Trends and Issues in Crime and Criminal Justice, (456), p.1.
Valli, C., Martinus, I. and Johnstone, M., 2014, January. Small to medium enterprise cyber security awareness: an initial survey of Western Australian business. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).