Finally, there is a need to address the cyber-security issues at the corporate levels. The rate at which business firms are falling victims of fraudsters is increasingly becoming alarming. Operations at the organization level should be adjusted to suit the growing technology. Gold (2010) argues that simplified access but with a unique ID can help in avoiding unauthorized access to confidential information. Most of trust cybercrime issues and landing of confidential information to wrong hands result from sharing of ID. Not all individuals have good motives even when in their duties. For instance, some individuals working in the financial institutions always have the urge to steal cash. In such a case, the assertion by Gold (2010) helps in ensuring that every individual is accountable for any pilferage. If one is aware that his or her ID will be easily traced, then they are unlikely to carry any activity leading to loss of money. Moreover, organizations should integrate their network security layer with the data infrastructure. On a similar argument, as Gold advices on the need for ID, Korpela (2015) proposes the need for organizations to adopt training-role-based techniques to its staff. This ensures that every member of team specializes in a distinct role


Leave Comment

Your email address will not be published. Required fields are marked *