Position Paper
docx
keyboard_arrow_up
School
University of California, Los Angeles *
*We aren’t endorsed by this school
Course
292A
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
5
Uploaded by Osenaa75
1
Position Paper
Students Name
Course Title
Institution Affiliation
Professors Name
Date
2
Position Paper
Introduction
Cyberspace is essential in business management, although it exposes business travelers to
various cybersecurity threats, leading to their data loss. Hoelscher (2018) states that travelers
going on business trips are an easy target for cybercriminals, where generally 1 in 5 business
travelers is likely to be robbed of their data when traveling, while 3 in 10 senior business
managers are likely to be stolen off their data during their business trips. Business travelers are
an easy target because of security issues that make them vulnerable to cybercriminals.
Statement of the Issues
The first issue is charging mobile phones in public charging stations. When most people
travel, they often feel that their phones or laptop batteries are running out and need to be charged.
Hence, a free charging station may seem like a lifesaver, but these charging stations leave them
vulnerable since hackers could rig the stations to watch every move they make while connected
to the charging stations (Schlesinger, 2016).
The second issue is using unsecured platforms and networks when in foreign countries.
When employees, managers, and other executives travel to foreign countries, they are likely to
access the internet through various platforms and networks available in those countries.
According to Redzone Technologies (n.d.), some of these platforms and networks are unsecured.
They are used by the state and cybercriminals to electronically hijack individuals’ computer
devices that they use to access the platforms or networks.
3
The third issue is leaving the laptop of other computer devices powered and unattended.
When traveling, most people leave their laptops or phones unattended. Leaving computer devices
like laptops powered and unattended may allow cyber criminals to access the devices and install
malware, spyware, or retrieve confidential information (Redzone Technologies, n.d.).
The fourth issue is using public WI-FI hotspots. According to Hoelscher (2018), most
business travelers fail to take the most basic security precaution; connecting to unsecured WI-FI
networks at the airport or hotel exposes them to phishing attacks done to steal sensitive
information data.
The last issue is the failure to proactively secure internet-enabled devices like laptops and
mobile phones. Most business travelers fail to take proactive security steps like backing up their
data, locking their devices, stopping their devices from auto-connecting to available WI-FI
networks, leaving them exposed to cyber-attacks (CISA, n.d.).
The Position to be Taken on the Issues
Most business travelers assume that their organizations, in this case, Resort Operations,
are responsible for safeguarding their devices and data. This assumption is not true since it is a
collective responsibility for Resort Operations and its employees to secure their devices and data.
The organization should implement systems and policies that safeguard its systems and
employees. On the other hand, employees should take the necessary precautions to secure their
computer devices and data by avoiding or addressing the security issues mentioned earlier.
Conclusion and Recommendations
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
The complexity of the above cyber security issues suggests that Resort Operations and its
employees should consider alternative proactive actions when traveling and using their computer
devices to enhance their cybersecurity and prevent cyber-attacks such as identity theft and
phishing attacks. Therefore, in this context, the recommendations for employees at Resort
Operations would be to take proactive actions that range from protecting their devices by
updating them to the latest security software, backing up their data, locking their devices, and
stopping auto-connect to unsecured networks.
5
References
CISA. (n.d.). CYBERSECURITY WHILE TRAVELING.
CISA
. Retrieved on January 26, 2022,
from https://www.cisa.gov/sites/default/files/publications/Cybersecurity-While-
Traveling-Tip-Sheet-122019-508.pdf
Hoelscher, P. (2018, August 28). 30+ cybersecurity tips for travelers.
INFOSEC
.
https://resources.infosecinstitute.com/topic/30-cybersecurity-tips-for-travelers/
Redzone Technologies. (n.d.). 13 Mobile Device Security Tips for Foreign Business Travelers to
China. Retrieved on January 26, 2022, from https://www.redzonetech.net/blog/13-
mobile-device-security-tips-foreign-business-travelers-china/
Schlesinger, J. (2016, September 21). Travelers beware! That free charging station could hack
your phone.
CNBC
. https://www.cnbc.com/2016/09/21/travelers-beware-that-free-
charging-station-could-hack-your-phone.html