Friday, June 14, 2019

When Hackers Turn to Blackmail Article Example | Topics and Well Written Essays - 500 words

When Hackers Turn to Blackmail - Article ExamplePaul Layman, the CEO of Sunnylake, is in a quandary as to the options available to ring the dilemma.Mr. Layman is faced with the following alternative courses of action (1) pay the ransom fee of $100,00 to the hackers to immediately regain access to the body (2) improve security remains by changing access controls, installing power backups, increase defense in depth strategy, employ encryption of info during transmission, strengthen antivirus, power and data back-up systems, firewalls, employs a highly competent human resource, passwords, and other computer security software, as needed (3) disclose critical information to stakeholders and (4) go back to manual processing of health care records.After reviewing and evaluating the case facts including the expert advice of three commentators, Mr. Layman would be is the best position to do the following action. The advice of Richard L. Nolan is the most workable and consistent with the code of business ethics. First and foremost, Mr. Layman should decide once and for all that paying the hacker should not be considered at any cost. admit to their demands would make them vulnerable to future security breaches. Further there, there is no guarantee that these hackers would stick to their words.Concurrently, the stakeholders must be informed of the situation to make them sensible of dilemma that hospital is currently addressing. At the same token, IT personnel must round the clock to upgrade and fully secure their information system to match that this would never happen in the future. The present systems loopholes should all be corrected including installation of a dependable back up system and business continuity plan in case of emergency situations.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.