The technology around the world
is changing rapidly with the passage of time. In order to gain competitive
advantage on the organizations, continuously upgrading the technologies so that
they can grab a significant amount of market share and can sustain for a longer
time period. However, the risk regarding security and fair usage in the
organization is creating many problems for the organization. In the past, many
organizations have faced serious consequences due to cyber-attacks. That is why
the policy has been made for improving
the cybersecurity & utilization of devices in the organization.
Scope
& Urgency of the problem
In recent years the technology
around the world has experienced rapid growth. Due to the rapid growth of
technology, cyber thrusts has also increased up to a lot of extents. Due to the
increase in cyber-crimes, many organizations have suffered financial loss due
to which not only the performance but also the overall efficiency of the
organization has experience decline. Therefore for the organization, it is
highly important to create such a policy which increases the cybersecurity of
the corporations that not only the employee’s personal information remain
secure but also the organization remain safe from any cyber threat. A deep
analysis has been performed for identifying the flaws in the policies and how
cybersecurity can be enhanced in the organization. The analysis has indicated
three areas which lack a [roper cybersecurity policy. Those areas are explained
as follows:
Bring Your
Own Device (BYOD)
In recent years many
organizations have given permission to their employees to bring their own
laptop & smartphones in the offices so that employees can work more
conveniently. The BYOD approach has increased the confidence level of the employees
along with the motivation level; however, there are a lot of inheriting risk
which the corporations unable to realize completely. The first major risk is
the security risk because through the devices of employees contain the
information of the organization which any unauthorized individual can use for
its own advantage. Therefore a policy is needed regarding how employees can utilize
their devices for conducting there routine organizational activities (Genge, Haller, & Kiss, 2015).
IOT
(Internet of Things)
The internet of things means that
all the devices are connected with each other with the help of a smartphone or
any remote controller; various devices can be controlled. In the office, if
different devices are going to be controlled according to individual
preferences, then various issues can occur. For instance, if an individual set
the room temperature of the office too low according to its own desire than
other employees n the office might experience inconvenience. It means that a
proper policy id needed so that the devices can be controlled in such a manner
that everyone should be happy (Jayakumar, et al., 2014).
Cloud
Storage of Improving Cyber Security & Device Usage
The cloud is considered a
convenient way of storing the data; however, there are many risks which are
associated with cloud storage. Although the cloud service providers state that
they secure the data of their clients and implement the latest practices for
reducing the cyber-attacks. However, cloud services are not as safer as cloud
service providers tell their clients. There are many policies which
organizations made when they select the cloud storage for storing the data. However,
such policy is needed, which will help the organizations to control the risks
regarding cybersecurity.
Evidence that indicates the importance of Problem
The recent data breaches and the
economic loss which the corporations face are big evidence which indicates that
cybersecurity is necessary. One of the biggest examples is regarding the
customers of the target, whose debit & credit card numbers were stolen.
After this incident, the target organization experience a great revenue loss
because customer satisfaction & loyalty declines. Therefore if an effective
cybersecurity policy is not made than many organizations can experience
financial loss along with other serious consequences like the decline in
customer loyalty. A cybersecurity & device usage policy will help the
organization to control various risks through which an organization can achieve
higher performance & efficiency (Corbet & Gurdgiev, 2017).
Available
alternatives for the Issues
Creating a
policy regarding the usage of organizational Resources
The first and most important
alternative which the organizations or authorities have is to set such policies
through which the cybersecurity can be enhanced, and all the issues which come
up with cybersecurity can be mitigated. The new policy which has been decided
for implementation is improving the cybersecurity & usage of devices within
the organization. It is expected that through this policy, the organization can
achieve various goals such as improving security, increasing employee
satisfaction and improving the overall performance of the organization. If the
resources of the organization are going to be utilized according to set
guidelines than chances of fraud & cyber-attacks will be reduced up to a lot
of extents.
Effective
internal control of Organizations
The effective internal control
can help the organization to reduce the risks which are associated with
security and management of IOT devices. When the internal control is going to
be strict, then no one will able to use the devices of the organization for its
own advantage. It means that the employees will be afraid of the management
that if they are going to use the devices according to their own will, then the
management can take strict action against them. So effective internal control
is also among the option which the corporation can implement (Baggili & Breitinger, 2015).
Recruitment
of IT experts and Improving Cyber Security & Device Usage
The corporation has the option to
recruit IT experts as well for improving cybersecurity and managing the IoT
devices in the organization. The IT experts have the necessary skills &
knowledge from which the organization can better handle its devices and data.
Usually, the IT experts have more knowledge regarding how the organization
should use the devices how the security can be enhanced (Nagy, Oláh, Erdei, Máté, & Popp, 2018).
The
possible outcomes of the alternatives
The first alternative that is a policy
about the usage of organizational resources will help the corporation to use the
data of the organization according to the set rules. When the employees are
allowed to use their devices in companies, they must be bound to use the
resources of the companies according to set guidelines. If not, then employees
will have to pay the penalty. Through this, employees will use the resources of
the company effectively, and the risk of cyber security will be mitigated up to
a lot of extents (Leukfeldt, Lavorgna, & Kleemans, 2017).
Through strong internal control,
the actions of the employees will be monitored, which will allow the
organization to increase the security. Through strong internal control, the
usage of IoT devices can also efficiently controlled. When the employees know
that they are being monitored than they do not perform any activity which they
think will harm their reputation in the organization. So through strong
internal control, the organization can achieve the goal of improving the
cybersecurity and usage of the IoT devices in the corporation.
Through recruiting, IT expects
the organization not only able to set such rules which will enhance the
security but will also improve the usage of the devices in the organization.
The IT experts have the skills to influence the employees to use the devices in
the right ways. It means that ultimately, the goal of the organization to
improve the usage of devices will be efficiently fulfilled (Genge, Haller, & Kiss, 2015).
Recommended
Course of Action and Improving Cyber Security & Device Usage
It is recommended to the
organization to implement the improvement of cybersecurity & device usage
policy so that the organization can mitigate the risks which are associated
with the cybersecurity. Through this policy, not only the devices in the
organizations are going to be used in an effective manner but also the
performance & efficiency of the organization will increase up to a lot of
extents.
The impact
of the latest policies on the organization’s Stakeholders
Considering the fact that the
very first policy is about enhancing cloud security, each and every member of
the organization would be impacted. The security of an organization is very
important because the company seems to handle years of data that it gains over
time. In addition, there is a lot of sensitive information that the company
cannot afford to lose. Information about the management system and supply chain
are considered critical for the company. It would suffice to say that anything
about the internal working of an organization is believed to be critical and
confidential. Furthermore, the company cannot lose even a little bit of it to
its competitors because there is a chance that the company might lose its
competitive edge in the market (Genge, Haller, & Kiss, 2015).
In order to ensure that such
information is safe in the database of the organization, the new policy will
require the manager of the workplace to back the data used in the cloud on a
daily basis. Each employee will be required to sign out of the accounts which
are being used in the systems of the company before sending the data used to
the manager. At the end of the day, the manager will store all the data in the
cloud. The password of the cloud account will only be known to the higher
authorities and not the employees. If the worker requires something related to
it, the manager will be responsible for opening the cloud account and
retrieving the data.
The second policy is concerned
with the Internet of Things, and it has several benefits for the organization
while it will limit the freedom of employees. In the smart organization, an
employee will have to consent with all other present workers in order to use
the air conditioner. It means that a worker cannot just come and turn it on
without the consent of others. It would ensure that others are not harmed or
disturbed by the actions of that employee. The employee will first have to ask
others and gauge whether they agree with him or not. If they are, he can turn
the air conditioner on. Meanwhile, if they are not permitting it, a worker
alone cannot turn it on (Conti, Dehghantanha, Franke, & Watson, 2018).
From the perspective of a
manager, this policy would be quite beneficial in promoting employee
communication and engagement. They would have to care for the opinions of
others before their own. This would also teach them how they should value the
ideas of others before they start acting on what they believe is right. In
addition, one of the most important benefits of this policy is that the
workforce will be structured in such a way that no one is disoriented. It will
teach employees that they have to take the consent of either the manager or the
whole workforce before acting towards something that belongs to the company.
The same can be said about projectors as well. In order to use it, the employee
should first ask the manager (Nagy, Oláh, Erdei, Máté, & Popp, 2018).
Conclusion
Action on Improving Cyber Security & Device Usage
It is concluded that the new
policy which has been decided for implementation is improving the cybersecurity
& usage of devices within the organization. It is expected that through
this policy, the organization can achieve various goals such as improving
security, increasing employee satisfaction and improving the overall
performance of the organization. If the resources of the organization are going
to be utilized according to set guidelines than chances of fraud &
cyber-attacks will be reduced up to a lot of extents. Through strong internal
control, the actions of the employees will be monitored, which will allow the
organization to increase the security. Through strong internal control, the
usage of IoT devices can also efficiently controlled. When the employees know
that they are being monitored than they do not perform any activity which they
think will harm their reputation in the organization. One of the biggest
examples is regarding the customers of the target whose debit & credit card
numbers were stolen. After this incident, the target organization experience a
great revenue loss because customer satisfaction & loyalty declines. A
cybersecurity & device usage policy will help the organization to control
various risks through which an organization can achieve higher performance
& efficiency.
References
Action of Improving Cyber Security & Device Usage
Baggili, I., & Breitinger, F. (2015). Data sources
for advancing cyber forensics: what the social world has to offer. In 2015
AAAI Spring Symposium Series., 6-9.
Conti,
M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things
security and forensics: Challenges and opportunities. Elsevier, 544-546.
Corbet,
S., & Gurdgiev, C., (2017). Financial Digital Disruptors and Cyber-Security
Risks: Paired and Systemic . 1(2), 1-20.
Genge,
B., Haller, P., & Kiss, I. (2015). Cyber-security-aware network design of
industrial control systems. IEEE Systems Journal, 11(3), 1373-1384.
Jayakumar,
H., Lee, K., Lee, W. S., Raha, A., Kim, Y., & Raghunathan, V. (2014).
Powering the Internet of Things. 375-380.
Leukfeldt,
E. R., Lavorgna, A., & Kleemans, E. R. (2017). Organised Cybercrime or
Cybercrime that is Organised? An Assessment of the Conceptualisation of
Financial Cybercrime as Organised Crime. 23, 287–300.
Nagy,
J., Oláh, J., Erdei, E., Máté, D., & Popp, J. (2018). The Role and Impact
of Industry 4.0 and the Internet of Things on the Business Strategy of the
Value Chain—The Case of Hungary. Sustainability, 10(10), 3491.