Thursday, May 2, 2019

When Hackers Turn to Blackmail Article Example | Topics and Well Written Essays - 500 words

When Hackers Turn to Blackmail - Article ExamplePaul Layman, the chief executive officer of Sunnylake, is in a quandary as to the options available to address the dilemma.Mr. Layman is faced with the following alternative courses of action (1) pay the ransom fee of $100,00 to the hackers to immediately regain access to the agreement (2) improve earnest system by changing access controls, installing power abideups, increase defense in prescience strategy, employ encryption of data during transmission, strengthen antivirus, power and data back-up systems, firewalls, employs a highly competent valet de chambre resource, passwords, and other computer security software, as needed (3) disclose critical information to stakeholders and (4) go back to manual processing of health care records.After reviewing and evaluating the case facts including the expert advice of three commentators, Mr. Layman would be is the best position to do the following action. The advice of Richard L. Nolan is the most viable and consistent with the code of business ethics. number one and foremost, Mr. Layman should decide once and for all that paying the hacker should not be considered at either cost. Conceding to their demands would make them vulnerable to future security breaches. Further there, there is no guarantee that these hackers would get to to their words.Concurrently, the stakeholders must be informed of the situation to make them aware of dilemma that hospital is currently addressing. At the same token, IT personnel must round the clock to upgrade and fully secure their information system to ensure that this would never happen in the future. The present systems loopholes should all be reverse including installation of a dependable back up system and business continuity plan in case of emergency situations.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.