Abstract

Imagine this scenario: you are a small business owner, and you’ve just been informed of a network security breach. In your Zoom meeting with the IT Department, you learned the details: network activity logs revealed aberrant behavior after hours. Threat actors accessed systems containing sensitive information and downloaded copies of key files containing company trade secrets, market strategies, and customer data – all within a matter of minutes. Immediately, you review the consequences of the breach in your mind: reputational harm, monetary loss, and potential lawsuits. You ask the IT professional about the root cause of the breach. Was it a single individual or a syndicate that pulled off the hack? How did the threat actors manage to bypass the company’s firewall and network intrusion detection system?

Document Type

Paper

Disciplines

Information Security

DOI

10.25776/dy6d-j685

Publication Date

2021

Upload File

wf_yes

Share

COinS
 

Best Cybersecurity Practices for Companies, Post Van Buren

Imagine this scenario: you are a small business owner, and you’ve just been informed of a network security breach. In your Zoom meeting with the IT Department, you learned the details: network activity logs revealed aberrant behavior after hours. Threat actors accessed systems containing sensitive information and downloaded copies of key files containing company trade secrets, market strategies, and customer data – all within a matter of minutes. Immediately, you review the consequences of the breach in your mind: reputational harm, monetary loss, and potential lawsuits. You ask the IT professional about the root cause of the breach. Was it a single individual or a syndicate that pulled off the hack? How did the threat actors manage to bypass the company’s firewall and network intrusion detection system?