You are on page 1of 3

Department of Marketing Course Code: MKT-505

Jahangirnagar University Digital Marketing


Savar, Dhaka

An assignment on
How can a tech-oriented organization secure its
footsteps into the cyber world?

Submitted to: Submitted by:


Md. Shahed Mahmud Abul Kalam Azad
Guest Faculty Reg: 40927
Department of Marketing Batch: 6th
Jahangirnagar University Department of
Marketing
Jahangirnagar University

1
Cyber security:
One might define cyber protection as attempts to propagate malware on machines, network and
system servers, mobile devices, electronic structures, and data systems, and systems, or even go
so it has been established, as a fundamental. Additionally, it is referred to as the protection of
digital technology or simply electronic information. It may be applied in different settings, but
usually consists of two or three major components, with the two or three components falling into
one of two distinct groups. There are different ways for a technology-oriented organization to
find and stay a foothold in the virtual environment Cyber security is a constantly evolving
subject, and this year is a good time to look at it. An company that is completely reliant on
technology must strive to provide the highest possible results. in books, the information shown
on TV, in every format, in all media, or on the internet Any technical measures are known to
help decrease the danger a technological firm is currently faces in dealing with cybercrime.
We've seen an episode of the BBC Radio 4 program of advice from a technology-oriented group
about how to deal with these new problems.  They are meant to be:

1. Comprehensive password security: An aggressive security that is lengthy and hard to


crack can protect company accounts in an organization. If we just let it be like, and give it a mix
of numeric and alphabet, and special symbols, then it can read in a hundred words. preventing
the users from using the same passwords on several accounts should also be enforced a long and
complex password is useless for encryption.

2. Data Processing: For an enterprise to have a data processing framework that is capable of
handling modern data, it must expand and use more up-to-date systems. a password which is the
result of a successful password management scheme used in a database ensures that the corporate
cyber system is safe

2
3. Up-to-date System: Cyber protection costs have gone up, but it hasn't made a difference
for most of the companies; as a result, companies keep underinvesting in it.

4. Authentication System: A two-factor verification scheme can be kept up to date. It


would ensure the integrity of the accounts and the processes.

You might also like