topic 3- dq-1- 2

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

831

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

1

Uploaded by ConstableLion3405

Report
Start-up companies begin their journey as small companies working within their means. As the company grows, their need for different software may as well. However, it is important for companies to be fully aware of the software capabilities and inabilities. Without this knowledge, the company opens themselves up to risky vulnerabilities. In 2016, over 28 million small businesses encountered some form of cyber security attacks (Teymoulouei & Harris, 2019). This number has only increased since the COVID-19 pandemic which forced companies to remain remote to keep their businesses afloat. A former employer was a start-up and began their journey in the United States with 8 employees. During this time, the company used Microsoft products for everything, while not free, it was a minimal cost for completing major tasks like client contacts and management and financial analysis. As we grew, both employee base wise and client wise, we began looking for other alternatives for customer relationship management software (CRM) outside of Microsoft Excel. We decided to go with a free CRM that came highly regarded. It was until our account was compromised and a fake wire transfer was requested and sent to an organization posing as our client. As of 2020, over 33% of computers were infected with some kind of malware, impacting the security of the owners. The infections have only increased since COVID-19 and the speed of infections and varieties have grown so rapidly that even forensic IT specialists are not able to keep up with all the varieties (Uandykova et al., 2020). MGM Casinos in Las Vegas experienced a major ransomware attack this month. This attack was done even through MGM’s extremely expensive security software. Where it is effective and efficient for startups to use free versions of software, caution must be used with all versions, including those paid for. This perspective only covers one aspect, the security risks associated with free software. There are other aspects to consider, such as limited functionality and additional manual work resulting from the need to compensate for the limited functionality. Teymourlouei, H., & Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Computational Science and Computational Intelligence (CSCI), 2019 International Conference on, CSCI , 7–13. https://doi- org.lopes.idm.oclc.org/10.1109/CSCI49370.2019.00009 Uandykova, M., Lisin, A., Stepanova, D., Baitenova, L., Mutaliyeva, L., Yuksel, S., Dincer, H. ( 2020). The social and legislative principles of counteracting ransomware crime, Entrepreneurship and Sustainability Issues 8(2): 777-798.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help