topic 3- dq-1- 2
docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
831
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
1
Uploaded by ConstableLion3405
Start-up companies begin their journey as small companies working within their means. As the
company grows, their need for different software may as well. However, it is important for
companies to be fully aware of the software capabilities and inabilities. Without this knowledge,
the company opens themselves up to risky vulnerabilities. In 2016, over 28 million small
businesses encountered some form of cyber security attacks (Teymoulouei & Harris, 2019). This
number has only increased since the COVID-19 pandemic which forced companies to remain
remote to keep their businesses afloat.
A former employer was a start-up and began their journey in the United States with 8
employees. During this time, the company used Microsoft products for everything, while not
free, it was a minimal cost for completing major tasks like client contacts and management and
financial analysis. As we grew, both employee base wise and client wise, we began looking for
other alternatives for customer relationship management software (CRM) outside of Microsoft
Excel. We decided to go with a free CRM that came highly regarded. It was until our account
was compromised and a fake wire transfer was requested and sent to an organization posing as
our client. As of 2020, over 33% of computers were infected with some kind of malware,
impacting the security of the owners. The infections have only increased since COVID-19 and
the speed of infections and varieties have grown so rapidly that even forensic IT specialists are
not able to keep up with all the varieties (Uandykova et al., 2020). MGM Casinos in Las Vegas
experienced a major ransomware attack this month. This attack was done even through MGM’s
extremely expensive security software. Where it is effective and efficient for startups to use free
versions of software, caution must be used with all versions, including those paid for. This
perspective only covers one aspect, the security risks associated with free software. There are
other aspects to consider, such as limited functionality and additional manual work resulting
from the need to compensate for the limited functionality.
Teymourlouei, H., & Harris, V. (2019). Effective methods to monitor IT infrastructure security
for small business.
2019 International Conference on Computational Science and Computational
Intelligence (CSCI), Computational Science and Computational Intelligence (CSCI), 2019
International Conference on, CSCI
, 7–13. https://doi-
org.lopes.idm.oclc.org/10.1109/CSCI49370.2019.00009
Uandykova, M., Lisin, A., Stepanova, D., Baitenova, L., Mutaliyeva, L., Yuksel, S., Dincer, H.
( 2020). The social and legislative principles of counteracting ransomware
crime,
Entrepreneurship and Sustainability Issues
8(2): 777-798.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help