Home Invites Blogs Chat Events Forums Groups Members News Photos Videos
Home > Blogs > Post Content

Areas to consider Innovating: Security Concerns from Small Business to Enterprise (406 hits)

Information Security and Information Assurance are increasingly popular buzzwords. Out in the wild, a wide variety companies are faced with the threat of increasing computer attacks, both inside and outside the business. When a breach does in fact occur, it compromises the integrity of the company; stealing closely guarded secrets, compromising confidentiality or client privilege and overall, damaging the reputation of the company. There are many facets of computer security to cover. In this article we will outline many concerns businesses face when conducting ongoing day-to-day operations.

Networking:

The company's network infrastructure is a growing field for entrepreneurs to strive. Many wondrous opportunities await for those willing to revolutionize the network. However, it is also an area where many computer attacks begin. Computer attacks within the organization only enter the network if the company allows them to. To elaborate, many companies in the past have immediately dismissed or ignored the importance of network security, using only software programs on individual machines to lock down computer threats.
A striving entrepreneur can benefit by studying the underlying networking principles and come up with solutions to mitigate DOS attacks, MITM attacks, brute-force and dictionary based attacks, session hijacking attacks, and SQL injection attacks. Each attack varies on layer according to the OSI model. But where there is risks there are opportunities. In the market, there are few Intrusion Detection and Intrusion Prevention systems that exist. An entrepreneur can find out ways to prevent most if not all of the aforementioned attacks from occurring if an entrepreneur can design methods of detecting and deterring attackers from abusing the company's online presence.

End Point Protection:

There are exists many forms that will cripple computer systems connected to company networks. Malware exists on any type of platform. There is the popular misconception that Macs are unaffected by malware. Guess what? That is wrong. There are many different ways to compromise a Mac. Session hijacking attacks are notorious for injecting malicious JavaScript into the web browsers of many Apple computers. All it takes is one specially crafted site for a mac to load into the web browser. And boom, the Apple is under the control of the attacker.
Thus, it is up to the entrepreneur to study not just one particular computer but all of them, and consider the types of threats that inflict the company as a whole. An entrepreneur could easily avoid many threats to OS's altogether if they focus on running solutions in the cloud, or by having the program run inside a web browser. SaaS are very popular because of the simplicity of having programs executing in the cloud and running in a web browser. It is something for entrepreneurs to consider when developing solutions to mitigate incoming attacks targeting individual machines.

Security Policies & Social Engineering:

There are many types of people who operate a business. Departments exist to separate the work load into smaller chunks for employees to handle. Each employee has different backgrounds, varying in different skillsets. Thus, it is important that all personnel in the organization is on the same level when it comes to both present and emerging computer threats. Employee training goes a long way as an invaluable investment to prevent many attacks from occurring as a result from negligence or incompetence. An entrepreneur can help elevate these risks by coming tackling these issues by designing training systems to simulate situations where risks occur and attacks are present. A knowledge employee can be a valuable asset to the organization as a whole, spotting phishing and other social engineering attacks.
Posted By: Evan Hab.
Sunday, July 3rd 2016 at 7:53PM
You can also click here to view all posts by this author...

Report obscenity | post comment
Share |
Please Login To Post Comments...
Email:
Password:

 
Forward This Blog Entry!
Blogs Home

(Advertise Here)
Who's Online
>> more | invite 
Latest Member Activity
maurice muhammad just edited his profile. 11:38AM
muhammed firat ozturk just edited his profile. 05:18AM
kyle dinapoli just posted a article entitled '8 entrepreneurial skills you should teach your kids '. 05:45PM
kyle dinapoli just became a new member. 05:37PM
adrienne lam just posted a article entitled 'eleven financial fundamentals every small business ceo must know'. 05:08PM
adrienne lam just posted a article entitled 'how to improve employee wellness'. 11:25AM
paarth garg just posted a blog entitled '4 steps to growing your business now'. 11:19PM
sarah fattah just edited her profile. 10:38PM
sarah fattah just posted a article entitled 'how the vc pitch process is failing female entrepreneurs'. 09:55PM
sarah fattah just became a new member. 09:48PM
shazim chaudhary just posted a video entitled 'what to include in a business plan for your app idea'. 08:34PM
shazim chaudhary just became a new member. 08:23PM
>> more | invite friends