Skip to main content

Why Should Every Organization Consider Cybersecurity in their Business Strategy?

These days business operation can't take place without using the technology and internet. Business must use computer network and system to perform their operations. Traditional methods of handling data and performing the job are already obsolete and workstation are digitalized. Information of an organization are being stored in the cloud and the type of information that any organization collects is increasing. Since, technology has become the part of business operation new strategy means more data, more information and more use of technology.


If the organization is collecting more information and storing the data, then the responsibly to keep that information security will increase. The organization must understand the current state of information security and potential risk to information after implementing the new business strategy. All the technical components like hardware, software, network configurations, must be reviewed to get information about security issues. Flaw on any one component means security threat to the critical information.


For example, a business is planning to move to the new country and to find out about their potential customer they might collect information about their interest and their information. The information they gather from the potential customer is stored in the database of the organization. Now, it is the responsibility of the organization to keep that information secure. There is always a risk to the information and threat are lying around us. If we don’t think about security while making plans and strategies, then we might not be able to achieve our goals.
Improper security plan will result in the failure of the organization and this is not a good strategy to run any business.

We should think about the potential security threat and the ways to secure it before implementing any strategies. Also, the strategies that we implement might create security loopholes in the system. In my opinion, security will influence an organization's strategy and strategy will impact their security. We can't isolate the impact of strategy on security and the implementation of strategy considering the security.

Let’s take the example of a store that only has a physical store and planning to go online and made a strategy to open their e-commerce website. To run their own e-commerce website, they need to store information of clients like their name, address, email, phone no. etc. Also, they need to securely process the transaction using credit cards or another payment gateway like PayPal. Now, they should make a strategy to store the information collected from the client securely. If they can’t guarantee the security of information collected from the customer, then they can’t be a success in their business. In this case, they first need to build a properly secure system that store information of customer and process the transaction securely. They might need to change their strategy to protect the data of the customer. Therefore, security will influence the strategy they make for their business.

On the other hand, strategy and plans can impact the security posture of the organization. We know that nothing is secure on the internet and every infrastructure has vulnerabilities. Implementation of our strategies might sometime give bad guys exposure to attack our system. Let’s take the example of a smartphone manufacturer company called OnePlus. OnePlus is an Android smartphone company whose strategy is to sell phones only from online store to make the smartphone cheaper by reducing the cost of the smartphone by avoiding the physical store. Their strategy is to sell the cheaper smartphone by reducing the operating cost of their business by avoiding any physical store. They started selling phones online but there were vulnerabilities in their payment system. They had announced that up to 40,000 customers credit card information was affected by the security breach and because of this, they need to shut down their payment gateway until the issue is fixed. From this example, we can see that our strategies might have impacted the security of our data and privacy. Therefore, strategies and securities should be considered as two sides of the same coins and we need to do proper research before making plans and strategies for our organization.

Popular posts from this blog

Why should we stop using SMS-based two-factor authentication?

 Today, securing an application is challenging as attackers are becoming increasingly sophisticated. A proper authentication system plays a significant role in application security, as, without one, the app’s vulnerability could allow a malicious person to gain unauthorized access. Poorly configured authentication systems and human error are the most common reasons for data breaches. Therefore, to address this issue, the concept of two-factor authentication (2FA) or multifactor authentication is applied. In addition to user ID and password, 2FA requires users to input a temporary code unique to them to verify their identity. This creates an extra layer of security by adding one more element to the authentication process. If a user’s login credentials are compromised, malicious actors won’t be able to access the resources since they would need to have both the login credentials and the 2FA code.  One of the most widely used methods of 2FA is an SMS-based code, where the user needs to en

Five Ways to Get Rid of Cryptojacking Malware

Cryptojacking is a growing threat in 2018 and there are several ways to prevent this threat. Few of the methods to prevent this emerging online threat are discussed below. Installing browsing extension Most of the crypto mining malware works from the web browser so we can stop that malware by installing a browser extension. There are few browser extensions like ublock origin & Malwarebytes that will help to block any cryptojacking scripts. If we have these extensions installed on the browser, they will automatically stop those scripts from running on the browser which will prevent the browser from running the mining code. Those extensions are available for free and they regularly update their signature. Since they will automatically filter the mining codes we don’t need to check them manually. Therefore, installing a proper extension will help to get rid of cryptojacking malware. Installing only trusted applications Another big source of crypto mining malware is untrusted ap

What is Phishing Attack? Understanding Phishing and it's Types

Phishing is a method used by fraudster for stealing valuable personal data from a user. It is generally done by sending emails or creating fake websites. One of the most common attacks that we see on cyberspace is phishing and it is rapidly growing cyber threat. To get the personal information from people attacker send a fraud email to large no. of people and few might fall for the scam. The attacker will ask the victim to provide their sensitive information like credit card information, social security number or username, and password. Phishing is one of the most common cyber-attack it is very easy to do, and it also doesn't require much resources and time. Most of the phishing act are automated and the done in a bulk and they wait for the victim to put their information.  The attacker will create a fake login form, malicious files or personalized message and send the victim to take the action on their email. If it reaches up to the victim, then they might think that the email is