The Challenge of Cyber Security in Organizations


TheChallenge of Cyber Security in Organizations

TheChallenge of Cyber Security in Organizations


Itis evident that cyberspace has become part of the modern life andinfluenced the lives of individuals in the society through itsdigital adversities. The digital expansion by use of the internet israpid in the society and is the core component at which we operate inthe society as well as in organizations. Nevertheless, the easeaccessibility of data has contributed to dire consequences relatingto security issues and cyber-attacks on both public and privatebusiness enterprises. The widespread effect across the globe posechallenges on the security cyberspace, on whether to blame the man orthe machine. Due to continuous cyberspace threats, there is a needfor implementation of effective measures to secure cyberspace.However, securitization may sometimes lead to distrust in differentorganizations. It is true that few individuals can manipulatecomputers codes used in organizations for self-benefit, and it istough to predict the occurrence though people can reinforcepreventive measures. Since people believe that, the future generationlies on technology, which can be used to convert the daily operationsonto online storage, people also can manipulate the sametechnological information. The error, therefore, can erupt frompeople and at the same time, technology can fail to meet thestandards.

Cyberspaceencompasses hardware, software, computers, the internet, individual’sinteraction as well as organizations, and it is termed aselectromagnetic spectrum through which the data is transmitted. Thetransmission with an aid of computer has moved the society to greaterheights through digitalization. The growth in digitalization oftechnologies creates the interconnectedness of different devices,industries and business organizations, which need proper securitiesto limit cases related to cyberspace threats in various sectors. Thebusiness owners and the management operators of organizations do notfind their operations to be risky since organizations have beenputting emphasis on the largest incidents that affect companies otherthan issues related to cyber security. Preferably, the experts havemajored their concern about the vulnerability of businesses that arecaused by lack of proper cyberspace defenses. The cyberspace threatseither internal or external have never been looked keenly by thesmall business managers and the government generally to find thesource of the problems on whether it lies in human interactions orthe operating machines.


Inmost cases, cyber criminals use an advanced technology to breachsecurity defenses, though the gadgets and protections used againsthackers can be of low technology that can be easily hacked by people.It is, therefore, very vital for every organization to maintaincertain criteria to wave out such incidences. The cyberspace securitymeasures should focus on issues such as proper educational measuresto employees to avoid the situation that may lead to cyber-crimes,and to help them detect and report the issues that occur to curbrisks during operation. The employees need to understand that even ifthey would not access the data, they can be used as an avenue toaccess other gadgets or computers with valuable data for the company,and manipulate. Software updates, employing stringent passwordpolicies, limitation on the downloaded applications, social medialimitations, and the key financial credentials for any organizationor company should be limited for access to everyone without properauthorization.

Organizationsshould ensure that the antivirus programs and software remainupdated. Such measures will help the firms’ credentials to remainsecured from any harm either by individuals who may hack the systemsfor self-benefit. The management of the organization should warntheir employees on opening folders or the attachments from email ofthe unknown links. Just as it has been mentioned, the cyberspacesecurity encompasses the safety of the information, individuals’operations as well as the computer systems. However, it is an evidentthat the issue related to security on cyberspace has triggered theattention of the national-level therefore, it requires thegovernment intervention and consideration that cut across protectionof the assets, controlling people’s operations, the systems, andnetworks that are vital for daily operation.

Accordingto Microsoft, they tend to believe that the nation should set itsstrategy on formulating ways that deal with cyberspace security. Suchpolicies will support the government in their steps taken to protectthe essential information and the ICT systems used by the governmentand other private firms. The initiative aims at promoting nationalsecurity, the safety of the nation as well as the economy (Hupp,2014). In developed countries, employees do work from theirresidential places, shops, at airports or even within the hotels, andit is true that every member will access their emails using wirelessinternet connections to respond and give necessary feedback. If thesenetworks are not secured properly, individuals may expose thecredential data of the company.

Whenstrategic partnerships are formed aiming to advance a safer internetusage, palliating threats, and vulnerabilities to cyberspacesecurity, it is evident that the public shall rely more onidentifying, prioritizing and assessing risks that will be associatedwith the cyberspace security. The more cyber-attacks on retailincreases, due to advancement in the technology used in industrialcompanies, the more there is the need for reinforcement of securityin cyberspace. In fact, there is the need for businesses and theircustomers to secure their data safely. Just as in the case ofbrute-force attacks on the networks to malware that compromisedcredit card information that disgruntled the employees’ operationthat sabotaged the companies’ networks, a problem that eruptedbecause of improper machine security.

Todefend the private corporation’s data and the operations, thefollowing need to be effected: the creation of a safe, legalenvironment for sharing data – the private companies does lead tothe forefront to be the most affected by cyber security. Thecompanies, therefore, should share data or information that concernscyber threats within the private organizations. Therefore, a safeenvironment should be created whereby companies would voluntarilyshare information without any fear of legal or regulatory rebound.Secondly, these companies should work in hand with the internationalpartners. Concerning Backoff malware attacks, the attacks can affecta multiple numbers at an increasing rate. The already infectednetworks can eventually infect companies that are within or outsidethe country. The foreign companies in collaboration with thegovernment need to join their efforts together to increase overallcyber security and as well to formulate actions that will fightagainst individual cyber criminals.

Theorganizations should also insure cyber – with the increasing numberof breaches cybersecurity insurance market has also increased(Kenealy, 2014). The insurance will help to mitigate all the costsrelated to breaches. The administration should enforce ways throughwhich proper allocation of liability and the establishment of cyberinsurance systems will be adopted to mitigate human errors and otherfaults related to cyber malpractices. Every business has toreconsider and understand threats that may hit the organization, andthe damage it might cause the society as well. Many times,organizations may experience nuisance hacking, which has a verylittle material impact on the company. Hackers, for example,interfering with the enterprise’s website.

Accordingto Welander (2013), a more severe and widespread threat has beenhacking for financial gain. In this type of hacking, the customers’credit card information and the passwords are cut for personal gain.The hackers would target the financial functions of the desiredcompany to obtain its business earning report before the officiallyreporting. In fact, with such manipulation, they will be able toprofit their accounts by either dumping or acquiring the stock. Thecompanies, therefore, need to protect both the cyberspace crime aswell as looking into ways of dealing with advanced threats that theyface in their operation. Companies need to ensure that they usevarieties of complex passwords and change them more often. Suchmeasures will help to ensure that both internal and external hackerscannot identify the financial data and trade secrets for theorganization. The technological changes also play a significant rolein the invention of the use of mobile and the social world. Thetechnological changes and other threats that companies face dotrigger the daily operations. It is, therefore, vital for everycompany to place strategies that will help the organization protectthe risks associated with the advanced new technology. The majorityof the companies need to put the focus on hand to help to eradicatesuch malpractices.

Thecyberspace security experts classify groups into two broadcategories: the individuals who have been hacked and the ones who donot know that they have been hacked (Perlroth, 2013). The tremendouseffect of the attack has led to severe social and economicconsequences that have made the United States’ officialsacknowledge the necessity of securing the existing cyberspacethreats. Even though State classify cyber threats as a nationalsecurity issue, Barrett et al., (2011) affirm that the complexitiesthat associate with cyberspace are that it does not depend on theState’s power for security since a larger percentage (90%) of thenetwork are competitive and private in nature. There is an increasein hacking incidents reported across the nation especially oncorporations due to cyberspace threats. A research was done byVerizon (2013) reports of different cyberspace threats such as datadisclosure of about 621, 47000-reported security incidents, and morethan 44 million compromised records noted in the United Statesresulting from malpractices such as hacking. The recorded events showhow the security of cyberspace has become more critical.

Securitizationof cyberspace

Hansenand Nissenbaum, (2009) state that the concept of cyberspace securitywas used first to define all sorts of malpractices such as thedestruction of data in a given system, protection against unwanteddisclosure as well as to safeguard the systems. However, the majorityof the firms have put much focus on addressing cyber security in amore technical discourse. Strategies set to aim at developingefficient programs that organizations can use to reduce externalattacks as well as viruses other than securing the issues, thusputting the center of the study on computer security. The move tochange securitization of cyberspace from computer security to cybersecurity combine both technical discourse and the nationalstrategies. The framework of national strategies for dealing withcyberspace threats expands on a daily basis though enforcing meansthat deals with threats have not developed across the globe. The vastconsequences, therefore, calls for placement of cyber security.

Thestate usually focuses on protecting infrastructure that forms thecritical section of the state in maintaining its ability to functionwhen dealing with issues related to cyber security (Nissenbaum,2005). The infrastructural sector has become more vulnerable toattacks due to external hackers, and interconnectedness of networks.The higher percentage of the actor in cyberspace security isdominated by the private sector, who are also the primary owners ofcomputer systems with experiences on the issues. In most cases, thereis interlinked relationship between private corporations (who areservice providers) and the state hence, the private sector possessesresponsibilities to deal with cyber security and respond to any formof cyber threat.

Thenation-state has two major options to address issues related to cybersecurity that is, implementing preventive measures that help toreduce impacts of potential threats, and equipping themselves fromvulnerability to the threats. Considering the cyber threats that thestate face within their infrastructural systems, some members haveput emphasis on law enforcement as others propose for collectivemilitary actions to cyber threats. The state, as well as non-statestakeholders, have developed policy agendas of securitization on someof the cyberspace threats that will help to reduce any existingdifferences and create active cooperation. The states should take aninitiative to establish their defenses against cyber-attacks for themto be successful. Building on strategies that deals with cyberthreats can in turn improve the security of the alliance nations.


Theincreasing number of cases of cyber-attacks in United States’companies has posed an enormous threat to the entire business sectorsand the existing customers. Since companies face threats of hackersto their servers, policies should be instituted to help curb thesituation preferably in private sectors. The government has a duty tohelp establish cyber security guidelines. It is now evident that thechallenge of securing cyberspace lies on both parties (human andmachine) though technology is viewed to have less influence since itis people cannot rely on the machine alone to work on the duties. Itis true that human carries the greatest influence concerning thechallenge of securing cyberspace. People are the ones who create theinternet and perform malpractices. Individuals have not taken theinitiatives through the law enforcement to regulate the internet.Fostering on proper control measures are very significant therefore,members should ensure that software programs are scrutinized for anyloopholes that would occur, and eliminate all internet errors toensure safety while using the internet. There are also individualswho have designed programs and websites purposely for stealing fromthe unwise persons. To eliminate such incidences, principal leadersshould set regulatory laws and policies that govern both websiteusers and designers. A joint group work will serve best in minimizingcyber threats in the society.


Barett,Major General Mark, Bedford, Dick, Skinner, Elizabeth &amp Vergles,Eva (2011), AssuredAccess to the Global Commons – Maritime Air Space Cyber,NATO, Norfolk, Virginia.

Hansen,L., &amp Nissenbaum, H. (2009). DigitalDisaster, Cyber Security, and the Copenhagen School,International Studies Quarterly (2009) 53, 1155–1175.

Hupp,S. L. (2014). Clarke, Richard A. &amp Robert K. Knake. Cyber-War:The Next Threat to National Security and What To Do About It. LibraryJournal,(8) 45.

Kenealy,B. (2014). Risk managers eye cyber threats Exclusive BusinessInsurance survey shows data breaches now head list of concerns.BusinessInsurance,(4).

Nissenbaum,H. (2005). WhereComputer Security Meets National Security, Ethics and InformationTechnology, 7(2)61-73

Perlroth,N. (2013) TheYear in Hacking, by the Numbers,The New York Times [Online]. Received from[Accessed 30 November 2015].

Verizon(2013) 2013 DataBreach Investigations Report,Verizon Risk Team.

Welander,P. (2013). Cyber security experiment reveals threats to industrialsystems. ControlEngineering,(10) 38.