Position Paper

docx

School

University of California, Los Angeles *

*We aren’t endorsed by this school

Course

292A

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

5

Uploaded by Osenaa75

Report
1 Position Paper Students Name Course Title Institution Affiliation Professors Name Date
2 Position Paper Introduction Cyberspace is essential in business management, although it exposes business travelers to various cybersecurity threats, leading to their data loss. Hoelscher (2018) states that travelers going on business trips are an easy target for cybercriminals, where generally 1 in 5 business travelers is likely to be robbed of their data when traveling, while 3 in 10 senior business managers are likely to be stolen off their data during their business trips. Business travelers are an easy target because of security issues that make them vulnerable to cybercriminals. Statement of the Issues The first issue is charging mobile phones in public charging stations. When most people travel, they often feel that their phones or laptop batteries are running out and need to be charged. Hence, a free charging station may seem like a lifesaver, but these charging stations leave them vulnerable since hackers could rig the stations to watch every move they make while connected to the charging stations (Schlesinger, 2016). The second issue is using unsecured platforms and networks when in foreign countries. When employees, managers, and other executives travel to foreign countries, they are likely to access the internet through various platforms and networks available in those countries. According to Redzone Technologies (n.d.), some of these platforms and networks are unsecured. They are used by the state and cybercriminals to electronically hijack individuals’ computer devices that they use to access the platforms or networks.
3 The third issue is leaving the laptop of other computer devices powered and unattended. When traveling, most people leave their laptops or phones unattended. Leaving computer devices like laptops powered and unattended may allow cyber criminals to access the devices and install malware, spyware, or retrieve confidential information (Redzone Technologies, n.d.). The fourth issue is using public WI-FI hotspots. According to Hoelscher (2018), most business travelers fail to take the most basic security precaution; connecting to unsecured WI-FI networks at the airport or hotel exposes them to phishing attacks done to steal sensitive information data. The last issue is the failure to proactively secure internet-enabled devices like laptops and mobile phones. Most business travelers fail to take proactive security steps like backing up their data, locking their devices, stopping their devices from auto-connecting to available WI-FI networks, leaving them exposed to cyber-attacks (CISA, n.d.). The Position to be Taken on the Issues Most business travelers assume that their organizations, in this case, Resort Operations, are responsible for safeguarding their devices and data. This assumption is not true since it is a collective responsibility for Resort Operations and its employees to secure their devices and data. The organization should implement systems and policies that safeguard its systems and employees. On the other hand, employees should take the necessary precautions to secure their computer devices and data by avoiding or addressing the security issues mentioned earlier. Conclusion and Recommendations
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 The complexity of the above cyber security issues suggests that Resort Operations and its employees should consider alternative proactive actions when traveling and using their computer devices to enhance their cybersecurity and prevent cyber-attacks such as identity theft and phishing attacks. Therefore, in this context, the recommendations for employees at Resort Operations would be to take proactive actions that range from protecting their devices by updating them to the latest security software, backing up their data, locking their devices, and stopping auto-connect to unsecured networks.
5 References CISA. (n.d.). CYBERSECURITY WHILE TRAVELING. CISA . Retrieved on January 26, 2022, from https://www.cisa.gov/sites/default/files/publications/Cybersecurity-While- Traveling-Tip-Sheet-122019-508.pdf Hoelscher, P. (2018, August 28). 30+ cybersecurity tips for travelers. INFOSEC . https://resources.infosecinstitute.com/topic/30-cybersecurity-tips-for-travelers/ Redzone Technologies. (n.d.). 13 Mobile Device Security Tips for Foreign Business Travelers to China. Retrieved on January 26, 2022, from https://www.redzonetech.net/blog/13- mobile-device-security-tips-foreign-business-travelers-china/ Schlesinger, J. (2016, September 21). Travelers beware! That free charging station could hack your phone. CNBC . https://www.cnbc.com/2016/09/21/travelers-beware-that-free- charging-station-could-hack-your-phone.html