We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Data Breaches

essay
The whole doc is available only for registered users OPEN DOC
  • Pages: 3
  • Word count: 684
  • Category: Security

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

Data breaches is a term that our society is becoming all too familiar with. They have been occurring more often throughout the past couple of years. An article titled “Data Breaches Keep Privacy & Security Lawyers Increasingly Busy and Looking for Recruits” written by Steven T. Taylor (2012) states “those in the business of cybercrime and protecting against cybercrime may think of 2011 as the year of the breach.”(p. 2) Cyber security has always been a big issue but the more breaches there were the more serious of an issue it became. In 2011 these data breaches affected huge companies and corporations such as Citigroup, Lockheed Martin and many others. The article discusses that it is hard to know whether these data breaches were being done from the inside or not. Not being able to determine the source of these major leaks is a scary thought. These breaches affect more than just the company and the people directly involved.

Consumers and investors are going to be turned away from companies that are having security issues and as the article states, lawyers are being kept very busy. According to Taylor (2012) “They’re working long hours to keep up to date on a river of new regulations flowing from Washington and state legislatures, advise clients on ways to prevent such e-spills, perform triage when breaches happen, and conduct a range of other activities.” (p. 2) Not only, are businesses losing money when breaches happen because people do not want to have relations with that company anymore, they also have to spend money on lawyers to help protect themselves against any future issues that may arise. Data breaches and cyber-attacks are a major issue and yet things such as password security are still too weak. Making a password for websites and accounts is unavoidable. People mix up their passwords and often times make them easy so they can remember them. Unfortunately, this is a huge mistake.

Passwords need to be complex, they need to have lower case and capital letters as well as numbers in symbols. By having a stronger password it makes the job of a hacker more difficult but, security should not solely depend on a password. In the article, “Password Security Remains the Weakest Link Even After Big Data Breaches” author Fahmida Rashid (2011) shares with us that “Security experts recommend taking a multilayered approach to security. Instead of relying on a single point of failure, organizations should be implementing several mechanisms to make it harder for cyber attackers to steal sensitive, confidential data.” (p. 38). The more layers of protection the better. There is no such thing as total protection from cyber-crimes. But, by making data harder to reach and using multiple layers of protection will fend off some hackers because the work is greater than the payoff (Rashid, 2011 p.38) Although, just because getting through a system is difficult does not mean that a determined hacker will not get through.

When it comes to security it is all about making the other person’s task as hard as possible to complete. In the article “Cracking the Code on Cyber Crimes” the author Kelly Liyaka (2012) states “The general consensus among security experts is that cyber theft will perpetuate because of the nature of the Internet.” (p. 38). This is why it is detrimental to take the proper protection and security measures. Liyaka (2012) shares that “Experts say that failing to implement security measures for your business can be a little like driving without insurance in hopes that you’ll avoid a crash.” (p. 39). Driving without insurance is a dumb move and so is conducting a business or sharing private without any cyber security.

References:

Curses! Hacked Again. (2014). Consumer Reports, 79(11), 16
Liyakasa, K. (2012). Cracking the Code on Cyber Crimes. CRM Magazine, 16(9), 36-40 Rashid, F. Y. (2011). Password Security Remains the Weakest Link After Big Data Breaches. Eweek 28(11), 38-39 Taylor, S. T. (2012). Data Breaches Keep Privacy-&-Security Lawyers Increasingly Busy and Looking for Recruits. 31(2), 1-18 Weiss, S. (2011). Tempting Target. State Legislatures, 37(6), 30-32

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59
Become a Member