Part 2: Top Challenges Faced by Business Leaders

Top Challenges Faced by Business Leaders

Rising cyber security threats

With the current rapid growth of the digital ecosystem, there has also been a remarkable growth in threats to the safety of the data stores of many businesses and governments alike. Currently, there has been a proliferation of shocking cyber-attacks that have left a host of big global businesses wrestling for a solution to deal with this menace as noted by Upton and Creese (2014). Cyber security is no longer a mere issue for the information technology (IT) departments, considering highly established firms like Vodafone, JP Morgan and Samsung has been adversely affected by this (Moskovkin, Shigorina, & Popov, 2012). These and other companies as well as government entities have been compelled to pay millions to their customers because of the breach of information, in addition to suffering loss of customers due the perceived lack of confidentiality of their information.

Cyber insecurity is taking many forms, some of which include ransom ware, which restricts the systems it affects, cyber espionage and cyber theft, where important business information is being vandalized. The consequences of a company’s data being breached can devastate its reputation and its finances. The tragedy is there is no definite way to obstruct the ever scheming virtual intruders. These intruders are gaining access to immense amounts of valuable and highly sensitive business data such as customer financial information, data on company systems, among other emerging and rapidly advancing problems. To address this problem, business leaders must note that technology alone will not be effective in addressing the problem because intense human capital is being required to establish and uphold these technologies. Indications by Hipkins, Harbaugh, Morris & Aucsmith (2017) aver that since the technological solutions required to address this problem are constantly changing, there is an ever increasing need to provide constant training to the IT professionals responsible for implementing the solutions.

References

Hipkins, E., Harbaugh, J., Morris, M & Aucsmith, D. (2017). Hunt: Securing the Commercial Sector Since 2013. Journal of law and cyber warfare. Vol 5 (2). http://www.jlcw.org/wp-content/uploads/2017/02/JLCW_5_2_Final.pdf

Moskovkin, V. M., Shigorina, N. A., & Popov, D. (2012). The possibility of using the Google Patents search tool in patentometric analysis (based on the example of the world’s largest innovative companies). Scientific and Technical Information Processing, 39(2), 107-112. https://link.springer.com/article/10.3103%2FS0147688212020086?LI=true

Upton, D. M., & Creese, S. (2014). The danger from within. Harvard business review, 92(9), 94-101.https://hbr.org/2014/09/the-danger-from-within

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s