SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Implementing Cyber
security Best
Practices and New
Technology
Damilola Ishola
Best Practices
Examples of best practices include:
1. Protect your data
2. Use a strong password and
authentication
3. Enable firewall protection
4. Invest in security systems
5. Embrace education and training
6. Avoid unknown emails and links
7. Employ the National Institute of
Standards and Technology (NIST)
Importance of Cyber Security Best Practices
To protect the digital asset and
reduce the likelihood and impact of
hackers and attacks (Garden state
cyber threat highlight, 2021)
Common Cyber Attacks
1. Malware attacks: “malicious software” such as
ransomware, spyware, and viruses that disrupt
computer operations
2. SQL Injections: This is a deceptive website
programming code that gets entered into the
network database
3. Denial of Service attacks (DoS): This is high traffic
flooding that shuts servers, network and website
4. Password attacks: This is an attempt to breach
password protection
5. Phishing scams: Trustworthy websites and emails that
entice users into clicking a dangerous link
6. Spear phishing scams: This type of attack targets
organizations and companies, majorly directors and
executives (McGee, 2021)
Common Best Practice Implementations for
an Organization
1. Future-proof your enterprise : For
comprehensive protection across the entire
enterprise
2. Mitigate attacks: To detect and respond
faster than attackers can adapt and
eliminate threats within few minutes.
3. Stop chasing alerts: This is achieved by
moving beyond alerting and instantly
visualize malicious operations from root
cause
4. Remediate automatically
Other Cyber Security Implementations
1. Use a firewall
2. Enforce safe password policies
3. Document cyber security
policies
4. Backup company data regularly
5. Use multifactor identification
6. Install anti-malware software
User Experience for Implementing New
Technology
1. Emotions: The study of human
experiences. Examples are anger,
happiness, excitement, and anxiety.
2. Psychological needs: This is an
important role in predicting motivation
for the use
3. Values
4. Wellbeing
5. Task Load (Partala & Saari, 2015)
Plan For Implementing New Technology
●DEMAND CONTROL SUPPLY
●Business context IT principles IT services
●Business success IT governance Architecture
●Business capabilities IT Financial Management People
●IT contribution Metrics Sourcing
Examples Of New Technology
Video Streaming
Hybrid Learning
Artificial Intelligence
5G
App-Based Learning
Real-Time Location
Implementation Of Real-Time Location
It is used to automatically identify and track the
location of objects or people in real-time within a
contained area.
It is used to notify new locations
It is used to locate customers. e.g: delivery food
services
It is used to automatically track, and time stamp
the progress of people or assets
It is used to combine the identity of multiple items
placed in a single location
Recommendations For Evaluating
Successful Integration
1. Capabilities: A leader should know if the new technology produced
is a solution to a given problem.
a. What are the product's limitations and what it implies for the
organization?
2. Transparency.
a. What is the degree of transparency of the product
b. Is the product easy to navigate?
Goal Of Effective And Successful Integration
1. The main goal for any new technology is
to solve an existing problem and
generate profit for the organization
2. To improve the way people live
3. To make our jobs easier and more
efficient: truck lifts
4. Technology aids in better and more
convenient communication
CONCLUSION
●Implementing cyber security
best practices in new
technology helps safeguard
the organization from attacks
and futuristic attacks thereby
increasing output with the
sole aim of profit making for
the organization.
References
●Johansen, A.G. (2019 April, 09). 10 Cybersecurity Best Practices That Every Employee Should Know. Retrieved
from: 10 Cybersecurity Best Practices that Every Employee Should Know | Norton
●Ljungquist, U. (2014). Unbalanced dynamic capabilities as obstacles of organizational efficiency:
Implementation issues in innovative technology adoption. Innovation: Management, Policy & Practice, 16(1),
82–95. https://doi.org/10.5172/impp.2014.16.1.82
●Partala, T., & Saari, T. (2015). Understanding The Most Influential User Experiences In Successful And
Unsuccessful Technology Adoptions. Retrieved from: Tim7001v3
●Garden State Cyber Threat Highlight. (2021 Jan, 14). The Importance of Physical Security and Its Implications
On Cyber Security/NJCCIC. Retrieved from: The Importance of Physical Security and Its Implications on
Cybersecurity | New Jersey Cybersecurity & Communications Integration Cell (nj.gov)
●McGee, V. (2021 September,29). Most Common Cyberattacks in 2021/ Cyber Degrees. Retrieved from: Top
10 Most Common Cyberattacks in 2021 and How to Avoid Them (cyberdegrees.org)
References
Segal, C. (2021). 8 Cyber Security Best Practices For Your Small To Medium- Size Business/Cox BLUE.
Retrieved from: 8 Cyber Security Best Practices For Your Small To Medium-Size Business (coxblue.com)
Griffin, J. M., Hellmich, T. R., Pasupathy, K. S., Funni, S. A., Pagel, S. M., Srinivasan, S. S., Heaton, H. A., Sir,
M. Y., Nestler, D. M., Blocker, R. C., Hawthorne, H. J., Koenig, K. R., Herbst, K. M., & Hallbeck, M. S. (2020).
Attitudes and Behavior of Health Care Workers Before, During, and After Implementation of Real-Time
Location System Technology. Mayo Clinic Proceedings: Innovations, Quality & Outcomes, 4(1), 90–98.
https://doi.org/10.1016/j.mayocpiqo.2019.10.007
Tetef, S. (2017). Successful Implementation of New Technology Using an Interdepartmental Collaborative
Approach. Journal of Perianesthesia Nursing : Official Journal of the American Society of PeriAnesthesia
Nurses, 32(3), 225–230. https://doi.org/10.1016/j.jopan.2015.05.118
Rosenthal, J., Balakrishnan, K., Bruce, N., Chambers, D., Graham, J., Jack, D., Kline, L., Masera, O., Mehta,
S., Mercado, I. R., Neta, G., Pattanayak, S., Puzzolo, E., Petach, H., Punturieri, A., Rubinstein, A., Sage, M.,
Sturke, R., Shankar, A., & Sherr, K. (2017). Implementation Science to Accelerate Clean Cooking for Public
Health. Environmental Health Perspectives, 125(1), A3–A7. https://doi.org/10.1289/EHP1018
References
Wood, S. (1987). The Deskilling Debate, New Technology and Work Organization. Acta Sociologica (Taylor
& Francis Ltd), 30(1), 3–24. https://doi.org/10.1177/000169938703000101

Weitere Àhnliche Inhalte

Was ist angesagt?

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Windstream Cloud Security Checklist
Windstream Cloud Security Checklist Windstream Cloud Security Checklist
Windstream Cloud Security Checklist Ideba
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-usersThomas Hughes
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
What Has Changed Since COVID-19?
What Has Changed Since COVID-19?What Has Changed Since COVID-19?
What Has Changed Since COVID-19?SophiaPalmira
 
A recommendation for software development responses for future
A recommendation for software development responses for futureA recommendation for software development responses for future
A recommendation for software development responses for futureMax Justice
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Ernest Staats
 
Research insights - state of network security
Research insights - state of network securityResearch insights - state of network security
Research insights - state of network securityMiguel Mello
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
 
Adapted from an ESG report - Outnumbered, Outgunned.
Adapted from an ESG report - Outnumbered, Outgunned. Adapted from an ESG report - Outnumbered, Outgunned.
Adapted from an ESG report - Outnumbered, Outgunned. Proofpoint
 
Manning Information Security Strategy
Manning Information Security StrategyManning Information Security Strategy
Manning Information Security StrategyDonald Tabone
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityMighty Guides, Inc.
 
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusSarah Vanier
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for EndpointMighty Guides, Inc.
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3Carlos Villafane
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Mighty Guides, Inc.
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkInterset
 

Was ist angesagt? (20)

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Windstream Cloud Security Checklist
Windstream Cloud Security Checklist Windstream Cloud Security Checklist
Windstream Cloud Security Checklist
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-users
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
What Has Changed Since COVID-19?
What Has Changed Since COVID-19?What Has Changed Since COVID-19?
What Has Changed Since COVID-19?
 
A recommendation for software development responses for future
A recommendation for software development responses for futureA recommendation for software development responses for future
A recommendation for software development responses for future
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
Research insights - state of network security
Research insights - state of network securityResearch insights - state of network security
Research insights - state of network security
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
Adapted from an ESG report - Outnumbered, Outgunned.
Adapted from an ESG report - Outnumbered, Outgunned. Adapted from an ESG report - Outnumbered, Outgunned.
Adapted from an ESG report - Outnumbered, Outgunned.
 
Manning Information Security Strategy
Manning Information Security StrategyManning Information Security Strategy
Manning Information Security Strategy
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT Cybersecurity
 
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
 
Lead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less WorkLead On: When More Data Becomes Less Work
Lead On: When More Data Becomes Less Work
 
Safeguarding the Enterprise. A new approach.
Safeguarding the Enterprise. A new approach.Safeguarding the Enterprise. A new approach.
Safeguarding the Enterprise. A new approach.
 

Ähnlich wie Implementing Best Practices.pptx

Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxdamilolasunmola
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docxvickeryr87
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
Grading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxGrading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxwhittemorelucilla
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxcuddietheresa
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follAISHA232980
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docxtoltonkendal
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 

Ähnlich wie Implementing Best Practices.pptx (20)

Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Grading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxGrading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docx
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 

KĂŒrzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

KĂŒrzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Implementing Best Practices.pptx

  • 1. Implementing Cyber security Best Practices and New Technology Damilola Ishola
  • 2. Best Practices Examples of best practices include: 1. Protect your data 2. Use a strong password and authentication 3. Enable firewall protection 4. Invest in security systems 5. Embrace education and training 6. Avoid unknown emails and links 7. Employ the National Institute of Standards and Technology (NIST)
  • 3. Importance of Cyber Security Best Practices To protect the digital asset and reduce the likelihood and impact of hackers and attacks (Garden state cyber threat highlight, 2021)
  • 4. Common Cyber Attacks 1. Malware attacks: “malicious software” such as ransomware, spyware, and viruses that disrupt computer operations 2. SQL Injections: This is a deceptive website programming code that gets entered into the network database 3. Denial of Service attacks (DoS): This is high traffic flooding that shuts servers, network and website 4. Password attacks: This is an attempt to breach password protection 5. Phishing scams: Trustworthy websites and emails that entice users into clicking a dangerous link 6. Spear phishing scams: This type of attack targets organizations and companies, majorly directors and executives (McGee, 2021)
  • 5. Common Best Practice Implementations for an Organization 1. Future-proof your enterprise : For comprehensive protection across the entire enterprise 2. Mitigate attacks: To detect and respond faster than attackers can adapt and eliminate threats within few minutes. 3. Stop chasing alerts: This is achieved by moving beyond alerting and instantly visualize malicious operations from root cause 4. Remediate automatically
  • 6. Other Cyber Security Implementations 1. Use a firewall 2. Enforce safe password policies 3. Document cyber security policies 4. Backup company data regularly 5. Use multifactor identification 6. Install anti-malware software
  • 7. User Experience for Implementing New Technology 1. Emotions: The study of human experiences. Examples are anger, happiness, excitement, and anxiety. 2. Psychological needs: This is an important role in predicting motivation for the use 3. Values 4. Wellbeing 5. Task Load (Partala & Saari, 2015)
  • 8. Plan For Implementing New Technology ●DEMAND CONTROL SUPPLY ●Business context IT principles IT services ●Business success IT governance Architecture ●Business capabilities IT Financial Management People ●IT contribution Metrics Sourcing
  • 9. Examples Of New Technology Video Streaming Hybrid Learning Artificial Intelligence 5G App-Based Learning Real-Time Location
  • 10. Implementation Of Real-Time Location It is used to automatically identify and track the location of objects or people in real-time within a contained area. It is used to notify new locations It is used to locate customers. e.g: delivery food services It is used to automatically track, and time stamp the progress of people or assets It is used to combine the identity of multiple items placed in a single location
  • 11. Recommendations For Evaluating Successful Integration 1. Capabilities: A leader should know if the new technology produced is a solution to a given problem. a. What are the product's limitations and what it implies for the organization? 2. Transparency. a. What is the degree of transparency of the product b. Is the product easy to navigate?
  • 12. Goal Of Effective And Successful Integration 1. The main goal for any new technology is to solve an existing problem and generate profit for the organization 2. To improve the way people live 3. To make our jobs easier and more efficient: truck lifts 4. Technology aids in better and more convenient communication
  • 13. CONCLUSION ●Implementing cyber security best practices in new technology helps safeguard the organization from attacks and futuristic attacks thereby increasing output with the sole aim of profit making for the organization.
  • 14. References ●Johansen, A.G. (2019 April, 09). 10 Cybersecurity Best Practices That Every Employee Should Know. Retrieved from: 10 Cybersecurity Best Practices that Every Employee Should Know | Norton ●Ljungquist, U. (2014). Unbalanced dynamic capabilities as obstacles of organizational efficiency: Implementation issues in innovative technology adoption. Innovation: Management, Policy & Practice, 16(1), 82–95. https://doi.org/10.5172/impp.2014.16.1.82 ●Partala, T., & Saari, T. (2015). Understanding The Most Influential User Experiences In Successful And Unsuccessful Technology Adoptions. Retrieved from: Tim7001v3 ●Garden State Cyber Threat Highlight. (2021 Jan, 14). The Importance of Physical Security and Its Implications On Cyber Security/NJCCIC. Retrieved from: The Importance of Physical Security and Its Implications on Cybersecurity | New Jersey Cybersecurity & Communications Integration Cell (nj.gov) ●McGee, V. (2021 September,29). Most Common Cyberattacks in 2021/ Cyber Degrees. Retrieved from: Top 10 Most Common Cyberattacks in 2021 and How to Avoid Them (cyberdegrees.org)
  • 15. References Segal, C. (2021). 8 Cyber Security Best Practices For Your Small To Medium- Size Business/Cox BLUE. Retrieved from: 8 Cyber Security Best Practices For Your Small To Medium-Size Business (coxblue.com) Griffin, J. M., Hellmich, T. R., Pasupathy, K. S., Funni, S. A., Pagel, S. M., Srinivasan, S. S., Heaton, H. A., Sir, M. Y., Nestler, D. M., Blocker, R. C., Hawthorne, H. J., Koenig, K. R., Herbst, K. M., & Hallbeck, M. S. (2020). Attitudes and Behavior of Health Care Workers Before, During, and After Implementation of Real-Time Location System Technology. Mayo Clinic Proceedings: Innovations, Quality & Outcomes, 4(1), 90–98. https://doi.org/10.1016/j.mayocpiqo.2019.10.007 Tetef, S. (2017). Successful Implementation of New Technology Using an Interdepartmental Collaborative Approach. Journal of Perianesthesia Nursing : Official Journal of the American Society of PeriAnesthesia Nurses, 32(3), 225–230. https://doi.org/10.1016/j.jopan.2015.05.118 Rosenthal, J., Balakrishnan, K., Bruce, N., Chambers, D., Graham, J., Jack, D., Kline, L., Masera, O., Mehta, S., Mercado, I. R., Neta, G., Pattanayak, S., Puzzolo, E., Petach, H., Punturieri, A., Rubinstein, A., Sage, M., Sturke, R., Shankar, A., & Sherr, K. (2017). Implementation Science to Accelerate Clean Cooking for Public Health. Environmental Health Perspectives, 125(1), A3–A7. https://doi.org/10.1289/EHP1018
  • 16. References Wood, S. (1987). The Deskilling Debate, New Technology and Work Organization. Acta Sociologica (Taylor & Francis Ltd), 30(1), 3–24. https://doi.org/10.1177/000169938703000101