Ist M3
Ist M3
A risk to data privacy is basically the security threat. Berimbolo Security might face security threats as
well. Spam can cause security threats to the computer, since it is mostly used to spread viruses. Internal
threats that Berimbolo Security might face are given below:
Internal Threats: This rises from sources inside the channels of an organization, as for an
example, a disgruntled member of staff with rights of entree who wants to commit illegalities.
This comprises managers of the organization, workers, freelancers, interns, etc., as well as inner
infrastructure.
Deliberate: These threats refer to malicious attempts by an insider to access and possibly harm a
company's data, systems or IT setup. There are various sorts of deliberate threats, which are as follows;
Employee actions: Disgruntled or recently dismissed staff may damage or delete files as a form
of revenge. They may also cause damage to the company software system or post damage
information about the company online.
Data theft: Employees may steal data such as customer lists, which they can sell to
cybercriminals or competitors.
Users overriding security controls: employees may want to bypass security controls as they find
them too restrictive and frustrating.
The external threats that Berimbolo Security might face is given below:
External threats: Individuals outside of a company who use the Cyberspace, other webs, or dial-
up connection in order to obtain illegal access to a company's networks. Threats from outside an
enterprise come from a number of sources,
Cybercriminals asking for money
To attack an individual or organization by creating pressure or by ransom after
obtaining their bank account particulars or credit card number
Pressurized by political violence.
To keep the company safe and secure, Berimbolo Security needs to take precautions. The company
can make the employees sign to an agreement where the policies and rules to prevent the company
from any threats are will be written down and the consequences that one may face if they breach any
regulation. Berimbolo Security can also mention the amount of fine that one employee will have to
pay if the company faces any harm or threats because of them. The company can follow the bellow
rules;
Personnel responsibility can involve securing office cabinets and drawers, closing or shutting
down unattended devices, carrying Identity card, and not disclosing any details or other basic
safety measures intended to prevent from social engineering threats.
Employees should be aware of the disciplinary repercussions of intentionally violating the rules
of any IT usage policy.
Guidance on how to carefully handle unknown email channels should be given by email
usage policies, including not opening attachment or following hyperlinks.
Internet usage rules should contain how to avoid malware-infected websites and how to avoid
security breaches during file download.
Security and password protocols can specify how credentials and authentication keys should be
safeguarded.
Companies will have a set of standards outlining what workers on their own devices are and are
not permitted to perform while at work, as well as how their devices can be connected to the
company's systems.