Professional Documents
Culture Documents
Student Name
Course Name
Professor Name
This week's assigned reading of The Educations Review online concerning the security
breach showed how sensitive personal information could be when not sufficiently protected. The
user and the organization can be open to problems by not properly securing records. A security
breach happens if an attacker receives unwanted access to secure systems and records within an
organization. A breach of security represents an early breach that may lead to devise harm and
data loss[ CITATION Jum20 \l 1033 ]. Some steps that should be taken to avoid future security
breaches are:
encouraging users to build safe passwords and then save and use them properly. It is a big step in
the right direction to retain an unforeseen and complicated secret. Be sure that they would never
repeat and update passwords frequently as and when an expiry warning is prompted. The
Update regularly
There are not just many pop-ups they get from time to time that reminds everyone of
updates. These updates do many things to enhance protection. One of the easiest ways to
continue to counter breaches is to upgrade the operating system and all programs, as updated
updates are most certainly finely tuned to avoid attacks. If programs are not routinely upgraded
It is necessary to educate the staff about the lethal effect of code violations. When a
security philosophy is embraced at all levels, from junior workers to the CEO, they would be
much less likely to face a data breach that can otherwise be prevented. Employees will require
Firewalls are network security's first line of protection. A firewall that is properly
installed acts as a barrier between networks of different confidence levels. It's important to
protect the local firewall because this is the only way to avoid malware attacks on the network.
Firewalls should be installed between any network linked to the internet to ensure full-spectrum
security. Organizations should set up specific machine protection programs for external network
Encrypted transmission
Secure transmission involves the transmission over a secure medium of data such as
of a kind. For cybercriminals, hacked encrypted data is useless. It will limit access to data and
make it worthless for those who have no key. The strength of cryptography is that Encryption is
References
SECURITY BREACH EVALUATION 4
Dayanim, B., & George, E. (2018). Data breach litigation and regulatory enforcement: A survey
of our present and how to prepare for the future. Cyber Security: A Peer-Reviewed
https://www.henrystewartpublications.com/sites/default/files/CSJDayanim.pdf
Juma'h, A., & Alnsour, Y. (2020). The effect of data breaches on company performance.
Retrieved from
https://www.researchgate.net/publication/335002124_The_Effect_of_Data_Breaches_on
_Company_Performance