Cyber Security

Cyber Security


Over many years, improvements and overreliance on technology have become rampant. Most people, public entities and private organizations use technology in their day to day activities which has been used to the extent of putting very personal and information that can compromise the lives of people or even their businesses. This has resulted in the emergence of individuals and groups with the intentions of exploiting these organizations for their selfish gain (Slorach & Ellis, 2017). This can be regarding making money or even executing a terror attack with the aim of driving a point home. These kinds of people are collectively referred to as cybercriminals.

Cyber security is a term used to refer to a group of technologies, measures and processes involved and designed to protect and prevent the occurrence of cyber-attacks in an organization (Slorach & Ellis, 2017). Once a sufficient cyber security is employed or put in place, it leads to the reduction of these kinds of attacks and protects individuals, organizations and other entities from being exploited deliberately b the attackers.

Any organization no matter how small it may look needs to employ an efficient cyber security system. This is because cyber-attacks have increased and have caused companies billions of dollars. As of the year 2016, more than four hundred and fifty billion dollars were stolen through cyber-crimes, and more than two billion persons reported the cases for being attacked (Slorach & Ellis, 2017). These figures show that cyber-crime does target not only big corporations but also small business and also individuals. Cyber-attacks are not just based on money theft but also records that might be of great importance to the people, organization or even to the nation. Some of the information that is usually targeted by these criminals include customer details, company’s secrets and payment card data and this can lead to damaging the reputation of a company (Slorach & Ellis, 2017). This is, therefore, the reason why every organization needs to implement a sound cyber security process.

Ethical considerations

Every business, organization or even a company is obligated to maintaining ethical considerations of the highest standards. This is between its clients and the management. This is done to ensure proper relationship and attraction of more customers to the organization.

The primary ethical consideration that businesses should put in place is that of safeguarding the information provided to them by their customers and client and making sure that the data that they have been entrusted to them by these clients is safe and cannot be compromised in any way (Mazumder & Braje, 2016). This will lead to more clients wanting to be associated with this kind of a company. For this to be achieved, some necessary measures have to be put in place. These include the company’s accessing where its chain of access and control of data is at the high most vulnerability followed by taking the appropriate steps in the aim of reducing the level of exposure.

Another method in which the company can reduce the instances of breach of employees’ data is by providing training to the employees and raising their awareness to the protection of client’s data. This is achieved by making the employees have the sense of responsibility for the protection of data (Mazumder & Braje, 2016). Since employees are the most substantial way of data breaching in companies, this is an area that needs to be addressed at the highest level. This can be done by creating and implementing steps to help employees navigate and escape ruses that have been put across by the hackers.

Maintaining a very high level of confidentiality is one of the most important rules related to ethical issues in any organization. As lawyers do, they support a high degree of confidentiality. A cyber-security handbook also suggests that no matter the source, every customer’s information should be protected and should not be viewed by any other outside source without the consent of the client (Mazumder & Braje, 2016). This should always be maintained to a high level.


I would recommend that people should avoid the use of online records like the cloud because cloud has been uttered as completely insecure to store information and have resulted in offering more opportunities for more security breaches and thus, therefore, putting of highly sensitive information on cloud is risky and can lead to complications in the ethical issues related to the customer’s information (Erturk, 2014).

The most sensitive documents in an organization should be secured with unusual security patterns. This will make sure that there are enough restrictions as to who will and will not access this information. This can be achieved by the use of technology that makes it impossible to open a particular document without the authorization (Erturk, 2014). This will improve the security and reduce the number of unauthorized access to these materials.

Every organization that handles very sensitive customer’s information should be able to implement a security that puts into considerations of both legal and ethical ways to protect the data. They should also come up with techniques that will include a response plan for just in case a breach has occurred.

There also should be the education of employees and be training them on how to reduce the instances of falling into traps that have been set by the hackers and this will involve all the people, process and the technologies (Erturk, 2014). There should also be a minimum use of BYOD in companies as these are other areas that are highly targeted by these criminals.


Since cyber-crime is improving to a great extent and these criminals have developed mechanisms in which they target the organizations, there is the need for organizations to protect themselves against these kinds of attacks. This is done through education, communication and training among employees as they are the leading target, imposing better methods of securing information other than doing it online and making sure that more sensitive information is handled correctly


Erturk, E. (2014). Cloud Computing and Cybersecurity Issues Facing Local Enterprises. Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 219-247. doi:10.4018/978-1-5225-1941-6.ch010

Mazumder, M., & Braje, T. (2016). Safe Client/Server Web Development with Haskell. 2016 IEEE Cybersecurity Development (SecDev). doi:10.1109/secdev.2016.040

Slorach, J. S., & Ellis, J. (2017). 15. Disclosure obligations of companies and company accounts. Law Trove. doi:10.1093/he/9780198787686.003.0015

Place this order or similar order and get an amazing discount. USE Discount code “GWEXDDSRGCF10” for 10% discount