Preview

Hong Leong Group Case Study

Good Essays
Open Document
Open Document
856 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hong Leong Group Case Study
6. Recommendations
Hong Leong group can adopt the following security measures to protect its business and its customers from cyber threats.
Cyber security training program- Hong Leong group can consider cyber security training for its employees. It is a known fact the outside consultants are required for external audits regarding software security but internal training to employees can minimize all possibilities of threats. Through this program Employees can be made aware of potential risks and how to tackle these risks. Training can be in the form of online training or classroom training whichever the organization things to be cost effective on its part. In fact online training is much more cost effective as training proceedings can be done
…show more content…
As Hong Leong group’s business relies on then use of mobile devices to interact with customers, the threat becomes high. Cyber criminals can inject virus or malware in the smartphones and make the phone unresponsive to the user. He can access user information from the phones through certain malicious programs and thus steal user identity. He can also manipulate the phone as his own to send SMS and spam mails and even make phone calls (Seals, iPhone-targeting XcodeGhost Malware Infiltrates US Enterprises, 2015).
When a business like Hong Leong group relies mainly on mobile devices, it must consider insisting its employees as well as customers to install mobile security software programs in their devices. Installing of security software like Antivirus and firewall can prove to be of great help. These programs detect and prevent any malicious software from entering the systems. Also software regarding visual notification and Biometric identifications can be used. Visual Notifications tend to warn the user of any unauthorized action that is happening on his device. Biometric Identification is a far superior technique of user identification and access to the device than password protection. It relies on identification of a person and granting him access to the device based on his morphology like fingerprint, eye retina images etc. As morphology of ever person is unique it provides a very
…show more content…
Cyber threats have become common especially for financial sectors and in order to overcome these threats they invest huge amounts for various security measures. But still cyber criminals find a way out to give light to their destructive intentions. In spite of such high security investments if cyber crime still occurs, then the organization may face huge issues and may be unable to come out of the losses incurred (Ferrillo, 2014). It is therefore always wise to have cyber insurance done for overcoming possible losses in the future. Various cyber insurance policies include credit/identity theft monitoring, customer notification expenses, privacy and security liability, cyber extortion, hacker damage costs and many more. Hong Leong group can identify the areas where it faces potential threats of cyber crime and can have cyber insurance done for those particular

You May Also Find These Documents Helpful

  • Good Essays

    Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    The level of security can determine the rise and fall of any organization, no matter how big or small the company may seem, so mitigating risk should always be the number one priority. Risk mitigation can be define as the process of implementing any form strategic actions that will reduce the level of threats that may cause financial hardship towards the organization. In addition, risk mitigation tracks, identify and evaluation all form of risk, including new and old. The focus of risk mitigation is to assist the organization’s department of security administration with identifying a list of potential problems that…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    As we enter a new age of computers and the use of the internet to conduct our business we open ourselves up to a new type of threat. Data and identity theft have become a real problem for many financial and government institutions. To combat this threat Richman Investments has implemented security measures at all seven domains in our IT structure. The seven domains include the User, Workstation, LAN, LAN to WAN, WAN, Remote Access, and System/Application layers.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Since then companies began to become more aware of the problems associated with computer and security. Only in 2013, the Utah government reported twenty-million cyber-attacks each day, so it suggests that there are trillions of cyber-attacks worldwide (Millions of Cyber Attacks Each Day, 2015). So, the steps that companies take are an organizational framework with new operations towards employee education, organizational policies, IT and network advisors to limit access as a job-related function (Trim & Yam-Im, 2010). Meaning education combined with limiting the number of people having full access to everything decreases the chance of a cyber-attack and with the security of an IT specialist proactively monitoring the system. For example, Lockheed-Martin's cyber-kill chain that stops the stages of malware by reconnaissance, weaponization, delivery, exploit, installation, command & control, and actions (Mattern, Felker, Borum, & Bamford, 2014).…

    • 750 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing the enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well the concepts for protecting the hardware and software assets of the enterprise.…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 457 Words
    • 2 Pages

    The problem is that good efforts in one area can be quickly nullified by failures in another. For example, a bank may protect its online banking portal from fraud only to have a privileged user copy confidential customer data to an unsecured laptop, which they then leave in a restaurant. These days, however, forward-thinking organizations like Global recognize the benefits of moving away from reactive “silo security” to take a more proactive and holistic approach to information security and compliance, based on the established discipline of risk management.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Gregg Shafel Case Summary

    • 422 Words
    • 2 Pages

    Technology innovation and global competition are two essential aspects of modern business, as a result companies invest a great deal in these areas (LeClair, 2000). It is imperative for senior management, like Steinhafel and his senior managers, to identify the information important to their business and which information is most valuable so that they can develop an IT infrastructure to protect those assets and then educate, inform, and train employees in a way that fosters a culture in which security is a priority (Dutta, 2002). With planning, innovation, and training a company can face the ever changing threats of the cyber world with increased confidence and thereby gain the confidence and business of their customers (Dutta,…

    • 422 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    BTC200 HW2

    • 422 Words
    • 2 Pages

    2) What are the two primary lines of security defense and how can organizational employees use the information taught by the Intense School when drafting an information security plan?…

    • 422 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    safeguard personal and business data. Mobile security apps can lock a mobile device remotely, erase its…

    • 318 Words
    • 2 Pages
    Satisfactory Essays