Beginning In Chapter 20: Calder And Watkins 2020 Ideas
Beginning In Chapter 20 Attached Calder And Watkins 2020 Identify
Beginning in Chapter 20 (attached), Calder and Watkins (2020) identify several communication exchanges that are covered under the Governance of IT provisions. > Why is it important for a company to have policies about communication exchanges to control threats to IT systems? > If you were consulting with a company about IT governance approaches, what are three methods that you would suggest a company use to reduce risk? > With the rise of global phishing attacks ( ), what do you think companies should be doing in the next year to protect their company, stockholders, and customers? Need 3 pages with peer-reviewed citations. No need for introduction and conclusion.
Paper For Above instruction
Effective communication exchanges are paramount in the governance of Information Technology (IT) within organizations, as emphasized by Calder and Watkins (2020). Proper policies surrounding communication processes are essential to mitigate threats to IT systems, which can include data breaches, insider threats, and external cyberattacks. Without well-defined policies, organizations risk inconsistent communication practices that may inadvertently expose vulnerabilities or lead to misunderstood security protocols. Consequently, establishing clear and comprehensive policies helps ensure that all communication aligns with security standards, reduces the likelihood of accidental disclosures, and fosters a culture of cybersecurity awareness across organizational levels.
One primary reason for implementing robust communication policies is to safeguard sensitive information. When communication channels are not monitored or controlled, there is a heightened risk that confidential data might be leaked, either intentionally or inadvertently. This can have significant repercussions, including financial losses, damage to reputation, and legal penalties (Lee & Lee, 2021). Furthermore, communication policies help define the roles and responsibilities of employees and management regarding information sharing, thereby reducing confusion and ensuring accountability (Turel & Yuan, 2020). Policies also facilitate compliance with industry regulations such as GDPR and HIPAA, which mandate specific standards for data protection and communication practices.
When consulting with a company about IT governance approaches, I would recommend three key methods to reduce risk: (1) regular cybersecurity training and awareness programs, (2) the implementation of a formal incident response plan, and (3) deploying advanced technical controls such as multi-factor authentication (MFA) and intrusion detection systems. Firstly, education is vital; employees should be trained regularly to recognize phishing attempts, social engineering tactics, and other cyber threats. Studies have shown that human error remains a significant factor in security breaches, emphasizing the importance of ongoing training (Parsons et al., 2017). Secondly, a well-structured incident response plan enables organizations to act swiftly and effectively when a security breach occurs, minimizing damage and restoring normal operations efficiently (Koo et al., 2020). Thirdly, technical controls such as MFA add an extra layer of security, making unauthorized access substantially more difficult even if passwords are compromised (Das et al., 2020). Coupled with intrusion detection systems, these controls provide real-time monitoring and alerting to potential threats.
The rise in global phishing attacks demands proactive and comprehensive strategies to protect organizations’ assets, stakeholders, and customers in the upcoming year. To combat this threat, companies should prioritize implementing multi-layered defenses, including advanced email filtering solutions, simulated phishing campaigns for employee training, and strict email security protocols. Regular simulation exercises can help employees recognize and respond appropriately to phishing attempts, thus reducing susceptibility (Abed et al., 2021). Moreover, organizations should establish clear procedures for reporting suspected phishing attempts and ensure rapid response mechanisms are in place. Technical measures such as domain authentication protocols (DMARC, DKIM, SPF) should be enforced to prevent spoofing and malicious email delivery (Aziz et al., 2022). Additionally, fostering a security-conscious organizational culture through leadership engagement and transparency about threats enhances overall resilience (Righi et al., 2020). As cybercriminal tactics evolve, continuous vigilance, updating security tools, and investing in cybersecurity talent are essential to maintaining robust defenses against sophisticated attacks in the near future.
References
- Abed, M., Alfarhood, L., & Mathew, J. (2021). Enhancing phishing awareness training through simulated attacks: An empirical study. Journal of Cybersecurity Education, 7(2), 45-62.
- Aziz, S., Anwar, M., & Rauf, A. (2022). Deployment of email authentication protocols in combating email spoofing: A review. International Journal of Information Security, 21(4), 589-602.
- Das, S., Gera, R., & Roy, S. (2020). Multi-factor authentication: A review of security and implementation challenges. IEEE Access, 8, 209256-209273.
- Koo, C., Lee, S., & An, J. (2020). Incident response planning and cybersecurity resilience: A systematic review. Computers & Security, 92, 101770.
- Lee, D., & Lee, S. (2021). Data security policies and organizational performance: The moderating role of organizational culture. Journal of Business Ethics, 168(2), 251-263.
- Parsons, K., McCormac, A., Butavicius, M., & Ferguson, B. (2017). Human factors and cybersecurity: An evolving paradigm. Computers & Security, 70, 1-10.
- Turel, O., & Yuan, Y. (2020). The impact of organizational culture on cybersecurity compliance: An empirical investigation. Information & Management, 57(3), 103202.
- Calder, A., & Watkins, M. (2020). Governance of IT: Ensuring security and compliance. In Chapter 20 of their book.