CSIA350 week 1 discussion
docx
keyboard_arrow_up
School
University of Maryland, University College *
*We aren’t endorsed by this school
Course
350
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
2
Uploaded by libdon4life
Kparkay Alvin Togba
Week 1: The Business Need for Cybersecurity CSIA350.
There are many options available to businesses today, but they are also exposed to various cybersecurity threats. The most common of these are cyberattacks, which are malicious acts against systems or individuals who use them. According to (Abdullahi et al., 2022) cybersecurity breaches can be
directed at a single organization or individual. Various individuals and organizations may also be targeted. Denial of service attacks, ransomware, and phishing are some of the most common threats to organizations. Firms must understand the nature of breaches and how to prevent them in order to minimize their impact. In the past few years, Premera Blue Cross has been affected by cybersecurity attacks more than other organizations. As a healthcare insurance company, this company provides a variety of services and products. In addition, there are disability insurance plans, life insurance plans, dental plans, and optical plans. Located in the Pacific Northwest, it provides goods and services related to public health and healthcare. The company disclosed in January 2015 that it had been attacked by cybercriminals. A hacker gained unauthorized access to customer records as a result of the attack. Confidential documents and data are involved. An insurance company's cybersecurity breach exposed the information of 11 million customers. Among the data were credit card numbers and social security numbers. In this case, attackers launched a phishing campaign using Prennera.com's domain name. In turn, they used the information collected from the victims in order to steal their personal information (Shahani, 2015). Both employees and customers of the company are expected to have been affected by the attack. People became less trusting of businesses' official pages as a result of the cybersecurity breach. Customer loyalty plays a crucial role for a business, as it can help it retain customers after a security breach occurs. Individuals provide insurance companies with highly confidential information. The company must secure the medical data of its customers to safeguard their privacy.
In order to protect information, it is essential to have the right personnel and systems in place. A secure network and systems engineer can be established to accomplish this. Additionally, these individuals can prevent sensitive data from being lost by maintaining the database. The cost of data loss can make it very difficult for a business to implement effective measures to prevent it from happening in the first place. A data leak caused by Premera Blue Cross in 2015 led to the company paying more than $7 million
in HIPPA fines (Shahani, 2015). Cybersecurity risks are a serious concern for businesses, as demonstrated
by the Premera Blue Cross incident in 2015. One of the most profound lessons a cybersecurity breach can teach a business is that it can cause significant damage. In addition to the importance of effective breach detection systems, businesses can also benefit from the incident. This step would have prevented the incident from occurring in the first place if Premera Blue Cross had taken it. It is not enough for businesses to have effective systems; they also need to hire cybersecurity professionals to implement effective safeguards. Their compliance with various laws and regulations can be made easier through this.
Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L., & Abdulkadir, S. (2022). Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review.Electronics,11(2), 198. https://doi.org/10.3390/electronics11020198
Fernandez De Arroyabe, I., & Fernandez de Arroyabe, J. (2021). The severity and effects of Cyber-
breaches in SMEs: a machine learning approach. Enterprise Information Systems, 1-27. https://doi.org/10.1080/17517575.2021.1942997
Shahani, A. (2015). NPR Cookie Consent and Choices. Npr.org. Retrieved 20 May 2022, from https://www.npr.org/sections/alltechconsidered/2015/03/18/393868160/premera-blue-cross-
cyberattack-exposed-millions-of-customer-records
.
Premera Blue Cross | Visitor. Premera.com. (2022). Retrieved 20 May 2022, from https://www.premera.com/visitor/about-premera
.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help