According to adam roth cyber security specialist from

This preview shows page 31 - 33 out of 41 pages.

According to Adam Roth, cyber security specialist from Dynamic Solutions International, the threat of data breach increases when companies allow third-party companies to access the company’s network. He adds that cyber criminals would likely not target Target’s servers directly because “a potential data breach typically does not directly attack the most valuable server, but is more a game of leap frog, going from a low-level computer that is less secure, then pivoting to other devices and gaining privileges” and that majority of the data breaches are “attributed to the exploitation of remote vendor access channels” (Schiff, 2015). Organizations like Target need to ensure that a security-minded culture is not just limited to their own organization; rather it should be a supply chain-wide culture that is instilled amongst all partners who have dealings and access to Target’s networks and IT infrastructure. Insider Misuse of IT Systems Creating a security-minded culture evolves from efforts to instill values and importance of security at an organization-wide level. This means employees need awareness regarding their actions and potential cyber security threats; their wrong decisions can cause security breaches that can result in millions of dollars of loss to companies. According to D'Arcy, Hovav, A., & Galletta (2009), employees can endanger the security of company’s IT infrastructure by misusing their Information Systems – specially by “sending an inappropriate email, use of unlicensed (pirated) software, unauthorized access to company’s data, and unauthorized modification of computerized data.” Hence, not only should organizations strive to create a security-minded culture through employee training and awareness, they should also put in place some restrictions on the local area network (LAN).
Image of page 31
TARGET CASE REPORT 32 LAN consists of interconnected workstations within a network that reside within ‘a limited geographic area -typically within a single building or campus’ (Pearlson and Saunders, 2013). What companies can do is put restrictions in place that would not allow any downloads into organizations servers. They can also restrict certain websites, emails, and software to prevent any malicious activities that would breach the company’s networks. Finally, they need to create proper awareness through Security Education, Awareness, and Training (SETA) program that is crucial to creating a security-minded culture within an organization. It would provide employees not only training, but also “raise employee awareness of their responsibilities regarding organizational resources” (D'Arcy, Hovav, & Galletta, 2009). Be Aware of Your Risk Tolerance: Risk tolerance refers to the “amount of uncertainty an organization is prepared to accept in total or more narrowly within a certain business unit”, and is often communicated in terms of specific “minimum and maximum levels beyond which the organization is unwilling to lose” ( Crickette et al., 2012).
Image of page 32

Want to read all 41 pages?

Image of page 33

Want to read all 41 pages?

You've reached the end of your free preview.

Want to read all 41 pages?

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern