INFORMATION SYSTEMS SECURITY AND RISK MANAGEMENT
Topics covered:
- Strategic importance of information security
- Legal, regulatory, and ethical issues
- Security threats, vulnerabilities, and controls
- Business continuity and disaster recovery
5.0 Introduction: Why Cybersecurity Matters for Business
In today’s digital economy, information is one of the most valuable resources an organization owns. Customer records, financial data, intellectual property, analytics, and internal communications all contribute to a company’s competitiveness. When these digital assets are compromised, stolen, or destroyed, the impact is often more severe than damage to physical property.
Cybersecurity is not just an IT issue—it is a core business function tied directly to strategy, operations, compliance, and reputation. Businesses of all sizes face cyber risk: multinational corporations with complex infrastructures, hospitals handling sensitive patient records, retail companies processing millions of credit card transactions, and even small businesses with only a few employees. A single mistake—such as clicking a phishing link—can trigger a ransomware attack costing hundreds of thousands of dollars in downtime and recovery.
For this reason, cybersecurity knowledge is essential for all business professionals. Whether you plan to work in accounting, marketing, management, supply chain, finance, or human resources, you will interact with digital information systems every day. Your decisions, behaviors, and awareness directly impact your organization’s security posture.
Discussion Questions
- Why might cyber risk be higher for small businesses than large corporations?
- Which department in a business can create cyber risk even if they never touch servers or firewalls?
Student Activity
Write one page describing how cyber incidents could disrupt your future career field (e.g., accounting, HR, sports management, marketing, healthcare administration).
5.1 Information as a Strategic Asset
Organizations rely heavily on digital information to make decisions, manage operations, market to customers, and innovate. Unlike physical assets, digital assets can be copied instantly, stolen quietly, and distributed globally in minutes. For many companies, data is now more valuable than physical inventory.
Consider a retailer that loses its sales analytics to a cyber breach. Even if inventory is intact, the company loses the insights required to set prices, determine promotional strategies, and manage supply chain decisions. In this way, information becomes a strategic resource whose protection is critical to long-term success.
Cyber incidents can have far-reaching business consequences:
- Financial losses: recovery costs, ransom payments, regulatory penalties
- Operational disruptions: shutdown of systems, delayed shipments, lost sales
- Legal consequences: lawsuits, liability claims, contract violations
- Reputational damage: loss of customer trust
- Loss of competitive advantage: stolen trade secrets or intellectual property
Case Example: The Target Breach
In 2013, attackers gained access to Target’s network through a third-party HVAC vendor’s credentials. Over 40 million credit card numbers were stolen. The breach cost Target over $200 million in settlements, upgrades, and lost sales, highlighting how even non-technical vendors can introduce risk. https://redriver.com/security/target-data-breach
5.2 Regulatory, Legal, and Ethical Dimensions
Businesses must comply with laws and regulations that govern how they protect information:
- HIPAA – Protects patient medical information
- FERPA – Protects student academic records
- GDPR (EU) – Protects consumer privacy rights
- CCPA (California) – Grants consumers control over their own personal data
Ethics go beyond compliance. Even when a business is not legally required to protect data in a certain way, customers expect honesty, transparency, and responsible handling of their information.
Discussion Questions
- Why is the loss of reputation often more costly than the technical failure itself?
- If a business follows the law but still exposes data, is that an ethical failure?
Mini Assignment: HIPAA Case
Scenario
You work in the billing department of a small medical clinic. One morning, a coworker receives an email from a patient asking for a copy of their medical record. The coworker downloads the file, attaches the patient’s full chart, and replies using their personal Gmail account because the clinic’s email system was temporarily down.
Later that week, the patient reports that their medical information has appeared in an online forum.
Questions
- Identify two ways in which HIPAA may have been violated in this scenario.
- Explain why using a personal email account poses a security and privacy risk.
- What should the coworker have done instead to comply with HIPAA requirements?
- If you were the clinic manager, what policy or training would you implement to prevent this from happening again?
Student Deliverable
Write a brief (5–7 sentence) response addressing the questions above.
5.2 Foundations of Computer and Network Security
For students with limited technical background, this section provides the essential concepts that support all cybersecurity strategies. Business professionals don’t need to configure firewalls or write encryption code—but they do need to understand how these technologies protect the organization and where human decision-making affects security.
The CIA Triad: A Foundational Model
The Confidentiality, Integrity, and Availability (CIA) triad represents three fundamental goals of information security:
Confidentiality
Ensuring that sensitive data is accessible only to authorized people.
Example: Protecting payroll data from unauthorized employees.
Integrity
Ensuring that information is accurate and unaltered.
Example: A bank must prevent unauthorized changes to account balances.
Availability
Ensuring that systems are accessible when needed.
Example: A restaurant’s point-of-sale system failing during lunch rush can cause massive losses.
The Principle of Least Privilege
Employees should only have the minimum level of access required to perform their job.
This reduces risk from both insider threats and compromised accounts.
Example: An intern should never have access to the company’s financial system or HR database, even if it seems convenient at the moment.
Network Security Basics
Network security refers to the technologies, processes, and policies that protect an organization’s digital environment from unauthorized access, misuse, and attacks. While the technical details can be complex, the core ideas are easy to understand when framed in familiar business terms. Think of network security as a combination of locks, alarms, boundaries, and checkpoints that keep digital traffic safe as it moves through a company’s systems.
Organizations rely heavily on secure networks to process payments, manage employee accounts, support remote workers, handle email, transfer files, and protect sensitive customer data. Weak network configurations are often the first place attackers look for vulnerabilities.
Firewall
A firewall acts as the network’s gatekeeper. It monitors and controls traffic entering and leaving the organization, allowing approved communication while blocking suspicious or unauthorized access.
What a Firewall Does
- Filters network traffic based on rules
- Blocks harmful or unexpected connections
- Prevents external attackers from directly accessing internal systems
Business Example
A retail store uses a firewall to ensure that only approved systems can access the payment processing network. Any unexpected connection attempt—from inside or outside the company—is blocked.
Analogy: A firewall is like a security guard checking IDs and deciding who is permitted to enter a building.
Intrusion Detection & Prevention Systems (IDS/IPS)
Firewalls act like guards at the door; IDS and IPS systems act like security cameras and alarm systems inside the building.
Intrusion Detection System (IDS)
- Monitors network traffic
- Alerts security staff when suspicious activity occurs
- Does not automatically block the traffic
Intrusion Prevention System (IPS)
- Monitors traffic and takes action
- Automatically blocks or stops malicious activity
Why It Matters for Business
Cyberattacks are often subtle and blend into normal traffic. IDS/IPS systems use behavior patterns and known threat signatures to detect anomalies quickly—sometimes before any damage occurs.
Example: If a hacker tries to guess employee passwords repeatedly, an IPS system can detect the pattern and block the attacker before they gain access.
Network Segmentation
Network segmentation divides a company’s systems into separate zones, limiting how far attackers can move if they gain access to one area. This follows a simple principle: don’t put everything in the same room.
Key Benefits
- Reduces the spread of malware
- Limits insider threats
- Protects sensitive systems from less secure parts of the network
- Simplifies regulatory compliance
Business Example
A restaurant chain separates its payment card network, where credit card transactions occur, from its guest Wi-Fi network, which customers use. Even if a customer’s device is infected with malware, the payment systems remain protected.
Analogy: Just as a building has separate rooms with locked doors, a network should have separate segments with digital barriers.
Virtual Private Networks (VPNs)
A Virtual Private Network (VPN) encrypts the connection between a remote user and the organization’s internal network. This protects data traveling over the internet from being intercepted.
Why Businesses Use VPNs
- Secure remote work
- Protect communication between branch locations
- Allow traveling employees to access company files safely
- Prevent attackers on public Wi-Fi networks from eavesdropping
Business Example
An employee working from home uses a VPN to securely access the company’s HR portal. Even if they’re on a shared or unsecured home network, the encrypted tunnel protects their communications.
Zero Trust Security
The Zero Trust model challenges a long-standing assumption in cybersecurity: that everything inside the network should be trusted. Instead, Zero Trust states:
“Never trust, always verify.”
Under Zero Trust, no user, device, or system is automatically considered safe—not even employees already logged in or devices inside the corporate network.
Core Principles
- Verify every access attempt
- Authenticate continuously, not just once
- Limit user access to the minimum necessary
- Monitor for unusual behavior
Business Example
An employee logs in to the company system from a new city. Instead of allowing automatic access, the Zero Trust system requires additional verification—such as MFA or a security challenge—before granting access.
Analogy:
Zero Trust is like requiring every visitor to show ID at each secured room, even if they passed through the lobby earlier.
Why Network Security Basics Matter for Business Students
Even though business majors may never configure a firewall or deploy a VPN, they influence network security through:
- Policy decisions
- Vendor and software selection
- Budget allocation
- Employee training
- Day-to-day behavior
Understanding these foundational tools empowers future business leaders to support secure operations and make informed decisions that protect organizational assets.
Encryption Essentials
Encryption is one of the most essential tools in cybersecurity. It protects information by transforming readable data (called plaintext) into an unreadable form (called ciphertext). Even if an attacker steals encrypted data, they cannot understand it without the correct key.
Businesses rely on encryption every day—when customers shop online, when employees send emails, when banks transfer money, and when hospitals store patient records. Without encryption, the modern digital economy would not function.
Encryption uses mathematical algorithms to scramble data so that only authorized parties can read it. To recover the original information, you need a key—a secret piece of data used during the encryption process.
Two Major Categories of Encryption
1. Symmetric Encryption
- Uses one key to both encrypt and decrypt information.
- Fast and efficient, making it ideal for large amounts of data (e.g., securing a hard drive or cloud storage).
- The challenge: securely sharing the key with others without it being intercepted.
Business Example:
Companies often encrypt backup files with one symmetric key so they can quickly restore large datasets.
2. Asymmetric Encryption (Public-Key Cryptography)
- Uses two mathematically linked keys:
- A public key (shared openly) that encrypts data
- A private key (kept secret) that decrypts data
- Removes the problem of securely sharing a single key.
Business Example:
When you visit an HTTPS website, your browser uses the website’s public key to encrypt your data so that only the site’s private key can decrypt it. This protects passwords, credit card information, and login forms.
Hashing
Hashing is a one-way mathematical process that converts data into a fixed-length string of characters. Unlike encryption, hashing cannot be reversed. Once hashed, you cannot retrieve the original data.
Why Hashing Matters
- Businesses hash passwords instead of storing them directly.
- When you log in, the system hashes the password you entered and compares it to the stored hash.
- If attackers steal a password database, they cannot immediately recover the original passwords.
Business Example:
A stolen hashed password database from a retailer is far less damaging than if the passwords had been stored in plain text.
Digital Signatures
Digital signatures verify two key things:
- Integrity – The message or document has not been altered.
- Authenticity – It truly came from the sender.
Digital signatures use asymmetric encryption:
- A sender signs a message with their private key.
- Anyone can verify the signature using the sender’s public key.
Business Example:
Software companies sign updates with digital signatures. Your computer checks the signature before installing the update to ensure it’s legitimate and hasn’t been tampered with by an attacker.
Why Encryption Matters for Business
Encryption is not just a technical feature—it is a core business safeguard that protects valuable data from unauthorized access, theft, or manipulation. In today’s digital environment, organizations exchange sensitive information constantly: processing payments, communicating with customers, transferring funds, storing employee records, and protecting intellectual property. Without encryption, this information would travel across networks as readable text, making it easy for attackers to intercept or exploit.
Because businesses rely so heavily on digital information, encryption plays a central role in maintaining customer trust, regulatory compliance, and business continuity. Below are some of the most important areas where encryption protects organizations.
• Credit Card Transactions
When customers purchase products online or in-store, their credit card numbers are transmitted from the merchant to the payment processor. Encryption keeps that data secure as it moves across the internet.
Business Impact:
A company that fails to encrypt payment data risks violating Payment Card Industry (PCI) standards, exposing customers to fraud, and facing steep fines or suspension from accepting card payments.
• Medical Records
Healthcare organizations store extremely sensitive patient information—diagnoses, medications, test results, social security numbers, and insurance data. Encryption ensures that medical data remains private whether stored in databases or transmitted between clinics, pharmacies, and insurance companies.
Business Impact:
A lack of encryption can lead to HIPAA violations, costly lawsuits, and damage to the organization’s reputation for patient care.
• Employee Information
Human resources departments manage personal data such as addresses, salaries, tax forms, background checks, and performance evaluations. Encrypting this information prevents identity theft and protects the privacy of employees.
Business Impact:
Breaches of employee data can lead to internal distrust, legal claims, and difficulty recruiting future employees.
• Bank Transfers and Financial Transactions
Businesses routinely move money electronically—payroll, vendor payments, refunds, and investment transfers. Encryption ensures that financial instructions cannot be altered or intercepted during transmission.
Business Impact:
Unencrypted financial transactions make companies vulnerable to fraud schemes, altered transfers, or unauthorized withdrawals.
• Trade Secrets and Intellectual Property
Companies rely on innovation to stay competitive. Encryption protects:
- Product designs
- Research and development data
- Formulas and patents
- Software code
- Strategic plans
Business Impact:
A competitor or foreign actor gaining access to unencrypted intellectual property can eliminate years of research and destroy competitive advantage.
• Communications Between Employees and Customers
Everyday communication—emails, customer service chats, contracts, internal memos, or telemedicine sessions—can contain sensitive information. Encryption ensures these messages stay private and cannot be intercepted by attackers.
Business Impact:
Unencrypted communication exposes businesses to eavesdropping, data leaks, and compromised customer relationships. For regulated industries, it can also trigger compliance violations.
The Bottom Line: Business Survival Depends on Encryption
Without strong encryption:
- Hackers could steal or alter financial information.
- Customer data could be publicly exposed.
- Competitors could obtain trade secrets.
- Regulators could impose heavy penalties.
- Customers could lose trust and move to competitors.
- Business operations could be shut down during recovery.
Encryption is therefore not optional—it is an essential business function that supports trust, reputation, legal compliance, and long-term success.
Endpoint and Mobile Device Security
Business cybersecurity extends beyond servers to laptops, smartphones, and tablets.
Risks include:
- Lost or stolen devices
- Unpatched software
- Malware infections
- Public Wi-Fi interception
Security measures include mandatory updates, mobile device management, and anti-malware software.
Security Operations
Organizations use continuous monitoring to detect and respond to threats:
- Log analysis: reviewing system activity
- SIEM tools: security information and event management
- Threat intelligence: knowledge of emerging attacks
- Incident reporting procedures: employees must know how to report suspicious behavior
Section Discussion Questions
- Why is multi-factor authentication considered one of the most effective controls in cybersecurity?
- What risks arise when employees use personal devices for business tasks?
5.3 Risks Associated with Information Systems
Cybersecurity risk comes in many forms—technical, human, physical, organizational, and environmental. Understanding these categories helps businesses anticipate and mitigate threats.
Human-Centered Risks
Human behavior is the leading cause of security incidents.
Common risks include:
- Weak or reused passwords
- Falling for phishing emails
- Accidental data exposure
- Mishandling sensitive information
- Malicious insiders
Activity: Phishing Identification
Students evaluate sample emails and identify red flags (fake domains, urgency, suspicious attachments) by taking Google’s Phishing Quiz: https://phishingquiz.withgoogle.com/
System and Software Vulnerabilities
Modern business systems rely on complex software—operating systems, databases, web applications, cloud services, and third-party components. With complexity comes risk: even well-designed systems contain weaknesses that attackers can exploit. For business leaders, understanding these vulnerabilities is essential because many incidents stem not from sophisticated hackers, but from simple gaps in maintenance or configuration.
Unpatched Systems
Software vendors regularly release updates that fix security flaws. When organizations delay installing patches—sometimes for convenience, sometimes due to oversight—attackers can exploit known vulnerabilities with little effort. Some of the largest breaches in history occurred because companies failed to apply a patch that had been available for months.
Business Impact: Unpatched systems can lead to ransomware infections, unauthorized access, and costly downtime.
Misconfigurations
A misconfiguration occurs when a system is set up incorrectly, such as leaving a database open to the internet without a password or allowing unrestricted file sharing. These mistakes often happen during rushed deployments or when employees lack training.
Example: Cloud storage buckets left publicly accessible have exposed millions of customer records for major companies, even when no hacker actively broke into the system.
Buggy Libraries (e.g., Log4j Vulnerability)
Businesses frequently use third-party software libraries to speed up development. If one of those libraries contains a flaw, every product or service using it becomes vulnerable.
The Log4j vulnerability in 2021 affected thousands of organizations, from banks and hospitals to cloud platforms. Attackers could remotely run code on any system using the library—highlighting how deeply embedded vulnerabilities can be.
Business Lesson: A single flaw in an external component can create widespread risk.
Outdated Legacy Systems
Older systems may no longer receive security updates, yet many organizations continue using them because they support critical operations.
Risks include:
- Incompatibility with modern security tools
- Known vulnerabilities that can’t be patched
- Higher failure rates
Legacy systems often represent the weakest link in a company’s security posture.
Why This Matters
Even one misconfigured server or outdated component can expose enormous amounts of customer data. Businesses must treat system and software vulnerabilities as strategic risks, not purely technical issues. Investing in updates, monitoring, and configuration management protects both customers and the organization’s reputation.
Supply Chain and Third-Party Risks
Modern businesses rarely operate alone. They depend on a complex ecosystem of tools, vendors, contractors, cloud services, outsourced IT providers, payment processors, marketing platforms, and software suppliers. Each partner introduces potential risk.
Attackers increasingly target third-party vendors because they often have weaker security controls or indirect access to larger organizations.
Why Supply Chain Risk Is Growing
- Small vendors often lack dedicated security teams
- Companies integrate more cloud-based services and APIs
- Contractors may use insecure devices or shared accounts
- Vendors may store or process sensitive customer data
If a vendor is compromised, attackers may gain a foothold inside the primary organization—even if the organization has strong internal defenses.
Case Example: Target HVAC Vendor Breach
In the 2013 Target breach, attackers accessed the retailer’s network through credentials stolen from a heating and air-conditioning contractor. Although the contractor had no direct connection to payment systems, their access was sufficient to move deeper into the network.
Key Lessons for Business:
- Vendors must follow strict security standards
- Third-party risk assessments are essential
- Access privileges should be limited to only what vendors need
- Contracts should include cybersecurity requirements
Supply chain security is not optional. It is a critical component of modern risk management.
Physical and Environmental Risks
Cybersecurity is often viewed as purely digital, but physical and environmental factors can compromise systems just as easily as malware or hackers. A company may have strong encryption and firewalls, yet still lose data if a server is stolen or destroyed.
Theft of Laptops or Servers
Portable devices store vast amounts of business data. When lost or stolen, they can expose sensitive information—especially if not encrypted.
Example: Numerous healthcare breaches have occurred because unencrypted laptops containing patient records were stolen from vehicles or offices.
Hardware Failure
Computers, hard drives, and network equipment have finite lifespans. Without backups and redundancy, a single device failure can result in major data loss.
Fires, Floods, and Severe Weather
Natural disasters can destroy entire data centers. Businesses must prepare by storing backups in separate locations or using cloud redundancy.
Power Loss
Power outages can corrupt data, damage equipment, and disrupt business operations. Surge protectors, battery backups, and generators help protect critical systems.
Temperature or Humidity Damage
Servers run best in controlled environments. Overheating, poor ventilation, or high humidity can lead to malfunction or permanent hardware damage.
Why Physical Security Is Cybersecurity
Physical controls—locks, access badges, surveillance cameras, server room restrictions—are just as important as firewalls and encryption. A hacker who gains physical access to equipment can bypass many digital protections.
A comprehensive cybersecurity program must address both digital and physical risks. Ignoring physical security creates openings that attackers can exploit, leading to data loss, system outages, and regulatory penalties.
5.5 Threat Surfaces
Every organization has a threat surface—the total set of points where an unauthorized user could try to enter, exploit, or damage the system. The larger the threat surface, the more opportunities exist for attackers. As businesses adopt new technologies, offer remote work, integrate cloud applications, and rely on external vendors, their threat surfaces naturally grow.
Understanding and managing the threat surface is not merely a technical responsibility. Business leaders make daily decisions—about software purchases, employee policies, vendor partnerships, and workflows—that directly expand or reduce these potential attack entry points.
• Employee Devices
Employee devices such as laptops, smartphones, tablets, and USB drives are some of the most common points of entry for attackers.
Risks include:
- Lost or stolen devices
- Insecure home Wi-Fi networks
- Outdated operating systems
- Personal devices used for work tasks
With remote and hybrid work increasing, employee devices now represent a major share of the modern threat surface.
Business Insight: Even secure networks can be compromised if an employee’s device becomes infected or misconfigured.
• Applications
Organizations use dozens—or even hundreds—of applications across departments: HR portals, CRM systems, accounting software, marketing platforms, scheduling tools, and custom-built apps.
Application risks include:
- Software vulnerabilities
- Weak authentication settings
- Misconfigurations
- Outdated plugins or libraries
- Excessive user permissions
Example: A small flaw in a web application could allow an attacker to access customer data or manipulate financial information.
• Cloud Services
Cloud services expand convenience and flexibility—but also add new surfaces attackers can target.
Examples of cloud-based threat surfaces:
- Storage buckets (e.g., AWS S3, Azure Blob)
- SaaS business tools (Salesforce, QuickBooks Online, Slack)
- Cloud infrastructure (virtual machines, databases, APIs)
Most cloud breaches are caused by misconfigured settings rather than failures of the cloud provider.
Business Lesson: Cloud simplifies infrastructure, but it does not eliminate the need for strong security practices.
• Vendor Connections
Vendors and contractors often require access to company systems to perform their jobs—installing software, managing HVAC systems, processing payments, providing IT support, or handling payroll.
Every vendor connection—even a small one—adds to the threat surface.
Risks include:
- Shared or weak vendor credentials
- Vendor devices lacking security controls
- Overly broad access permissions
- Third-party software vulnerabilities
Example: The Target breach originated from credentials stolen from an HVAC vendor—proving that even a “low-tech” contractor can unintentionally expose a high-tech enterprise.
• Remote Access Tools
Tools that allow employees or vendors to connect to internal systems from outside the organization are frequent targets for attackers.
Examples:
- VPNs
- Remote desktop tools
- Cloud collaboration platforms
- File-sharing systems
If improperly configured, attackers can bypass the network entirely and access systems directly.
Why Threat Surfaces Matter to Business Leaders
Executives and managers influence the threat surface every time they:
- Approve a new vendor
- Allow remote work
- Purchase new software
- Permit employees to use personal devices
- Adopt new cloud tools
- Make policy decisions
A large threat surface is not inherently bad—innovation requires adopting new tools. The key is ensuring visibility, control, and reduction of unnecessary exposure.
Managing and Reducing Threat Surfaces
Business leaders can help reduce risk by:
1. Eliminating unnecessary access
Action: Remove old accounts, unused applications, and outdated vendor permissions.
2. Enforcing security standards for employee devices
Action: Require updates, strong authentication, and encryption on all devices used for work.
3. Evaluating vendor cybersecurity practices
Action: Ensure contractors meet security expectations before granting access.
4. Implementing secure configurations
Action: Regularly review cloud settings, application permissions, and network controls.
5. Encouraging a culture of cybersecurity awareness
Action: Employees should understand how their actions expand or shrink the threat surface.
A threat surface encompasses more than technology—it reflects how the entire organization works. The decisions employees make, the tools they use, and the processes leaders establish all contribute to an environment that is either resilient or vulnerable.
Understanding threat surfaces helps future business professionals make informed decisions that minimize risk while enabling innovation.
Emerging Risks
New security threats are continuously being created. Some of these threats are created by bad actors, while others are just part of the growing pains of technological advances. Some of these are:
AI-Generated Threats
AI tools can create highly convincing phishing emails, voice deepfakes, and impersonation attacks.
Privacy Regulations
New global laws (GDPR, CCPA, AI Act) impose strict requirements on how businesses collect and store data.
Cloud Dependency
Companies rely heavily on cloud providers (AWS, Google Cloud, Microsoft Azure).
Outages can disrupt global operations for hours.
Quantum Computing
Future quantum computers could break today’s encryption methods, requiring new “post-quantum” algorithms.
Discussion Questions
- Which risk category (human, technical, physical, vendor) do you think is most dangerous to small businesses?
- Should companies be held responsible for breaches caused by their vendors?
Homework Assignment
Choose a recent major breach and classify the risks involved (human error, vulnerability, vendor, etc.).
Security Policies, Technologies, and Strategies
Security policies provide the rules, structures, and expectations for how an organization protects information. They guide behavior, support compliance, and reduce uncertainty.
Common categories:
- Acceptable Use Policy (AUP) – rules for device and internet use
- Password Policy – required complexity, expiration, storage
- Data Classification – public, internal, confidential
- Incident Response Policy – who to notify during a breach
- Remote Work Policy – VPN, device usage, home Wi-Fi security
Policies protect the company—but also employees by clearly defining expectations.
Homework: Read your university’s Acceptable Use Policy and summarize how it protects students and the institution.
5.5 Business Continuity and Disaster Recovery
Cybersecurity is not only about stopping attacks—it is also about ensuring the organization can continue operating after an incident. Even with strong security controls, disruptions such as ransomware attacks, server failures, natural disasters, or power outages can bring business operations to a halt. For this reason, organizations must plan not only to prevent incidents, but also to respond, withstand, and recover from them.
This concept is known as resilience: the ability to absorb shocks and restore normal operations quickly. A resilient organization experiences fewer financial losses, shorter downtime, and less damage to its reputation.
Business Continuity Plan (BCP)
A Business Continuity Plan (BCP) outlines how critical operations will continue during a crisis. It focuses on people, processes, and services rather than technology alone.
What a BCP Addresses
- How employees will work if office systems are unavailable
- How customers will receive essential services
- How to communicate during disruptions
- Alternative work locations or remote work strategies
- Manual or fallback processes for key functions
Business Example
If an accounting system goes offline during payroll week, the BCP may describe how to issue temporary paper checks or how to process urgent payments manually.
Why the BCP Matters
Without a continuity plan, even short disruptions can result in missed customer orders, regulatory violations, or lost revenue.
Disaster Recovery Plan (DRP)
A Disaster Recovery Plan (DRP) focuses specifically on restoring IT systems, data, and infrastructure after an outage or cyber incident.
While the BCP focuses on “keeping the business running,” the DRP focuses on “getting the technology back to normal.”
What a DRP Includes
- Which systems must be restored first (priority ranking)
- How to recover data from backups
- Procedures for restoring servers, applications, and networks
- Roles and responsibilities for the IT recovery team
- Estimated recovery time for each system
Business Example
If a company’s database server is destroyed by a fire, the DRP outlines how IT will restore the server from cloud backups and how long the process is expected to take.
Why Strong BCP/DRP Strategies Matter
A well-designed BCP/DRP strategy can save organizations millions of dollars by reducing downtime, preventing lost sales, maintaining customer trust, and avoiding penalties for failing to meet service commitments.
Potential Costs of Not Having a Plan
- Days or weeks of outage
- Permanent data loss
- Inability to serve customers
- Fines for regulatory non-compliance
- Loss of intellectual property
- Lasting reputational damage
Companies that recover fastest often gain a competitive advantage—customers remember who continued serving them during a crisis.
Backup & Replication Strategies
Backing up data is a fundamental part of disaster recovery. However, not all backups are equal. Businesses must choose backup and replication strategies based on how quickly they need to restore systems, how much data they can afford to lose, and where the backups are stored.
Below are the primary methods used to protect data.
• On-Premises Backups
Local backups stored on onsite servers, hard drives, or network-attached storage.
Advantages:
- Fast to restore
- Full control over hardware
Disadvantages:
- Vulnerable to physical damage (fire, theft, flooding)
- Impacted by ransomware if connected to the network
• Cloud Backups
Backups stored in cloud platforms such as AWS, Azure, Google Cloud, or dedicated backup services.
Advantages:
- Highly scalable
- Stored off-site by default
- Often encrypted and redundantly stored
Disadvantages:
- Dependent on internet access
- Requires trust in third-party providers
• Off-Site Storage
Physical copies of backups (e.g., tapes or encrypted drives) stored in a secure location away from the main office.
Advantages:
- Protects data from on-site disasters
- Useful for long-term archiving
Disadvantages:
- Slower to retrieve
- Requires physical transport and management
• Immutable Backups
Immutable backups cannot be changed, deleted, or encrypted—even by administrators. This makes them exceptionally valuable in defending against ransomware.
Business Value:
If ransomware corrupts all active data, immutable backups remain untouched and can restore operations quickly.
• Continuous Replication
Data is copied in real time (or near real time) to a secondary location.
Advantages:
- Minimal data loss
- Very fast recovery times
Uses:
Essential for industries that cannot tolerate downtime, such as financial trading platforms or hospital systems.
The Importance of Testing Backups
Backups are only useful if they can actually be restored. Many organizations discover—too late—that their backups were incomplete, corrupted, or never tested.
Testing ensures:
- Backups restore correctly
- Employees know the recovery steps
- The organization meets its recovery time goals
- Compliance with regulations is maintained
Business Insight
Testing backups is like practicing a fire drill: it prepares the organization for real emergencies and identifies weaknesses before they cause damage.
Summary
A strong Business Continuity Plan, a solid Disaster Recovery Plan, and well-designed backup and replication strategies form the backbone of organizational resilience. Together, they ensure that—even in the face of cyberattacks, hardware failures, or natural disasters—the business can continue operating and recover quickly with minimal loss.
5.6 The Human Element
Technology alone cannot secure an organization. Even the strongest firewalls, encryption tools, and monitoring systems can fail if employees accidentally expose data or fall victim to manipulation. Human behavior is often the strongest—or weakest—line of defense in cybersecurity. Because nearly every business process involves people, attackers frequently target human vulnerabilities instead of technical flaws.
Employees make decisions every day that affect security: opening emails, handling customer information, transferring funds, choosing passwords, and interacting with vendors. When employees understand risks and behave responsibly, organizations are far less likely to experience a breach. When they are uninformed, careless, or pressured, the risk increases dramatically.
For this reason, modern cybersecurity programs place significant emphasis on security awareness, training, leadership, and ethical behavior. These factors make up the “human layer” of cybersecurity.
Security Awareness & Culture
A strong security culture helps ensure that employees treat cybersecurity as part of their everyday responsibilities—not just a technical issue handled by the IT department. Building this culture requires ongoing education, supportive leadership, and clear communication.
A strong cybersecurity culture means employees:
• Recognize risks
Employees understand common threats such as phishing emails, weak passwords, malware, and data misuse. They know what risky behavior looks like and can identify warning signs early.
• Follow policies
Policies only work if they are followed. A security-aware workforce understands why rules exist—such as using multi-factor authentication or encrypting devices—and sees these rules as part of their job, not as obstacles.
• Report suspicious activity
Employees should feel comfortable reporting concerns such as strange emails, system errors, or unusual behavior. The faster an incident is reported, the easier it is to contain.
• Understand their role in protecting data
Whether in accounting, HR, marketing, sales, athletics, or healthcare management, every employee handles data in some form. Employees must understand what information is sensitive and how to protect it.
How Organizations Build Security Awareness
- Regular training sessions: annual courses, monthly refreshers, microlearning modules
- Simulated phishing exercises: practice identifying suspicious messages
- Clear communication: newsletters, reminders, alerts, posters
- Positive reinforcement: recognizing employees who report risks
- Easy reporting channels: simple methods to report suspicious emails or incidents
Business Insight:
Training is not a one-time event; it must be continuous to keep pace with evolving threats.
Social Engineering
Social engineering attacks exploit human psychology rather than technical vulnerabilities. Attackers know that people can be rushed, distracted, or overly trusting. By manipulating emotions—such as fear, urgency, curiosity, or helpfulness—they trick employees into granting access, revealing information, or taking harmful actions.
Common Forms of Social Engineering
• Phishing: fraudulent emails
Phishing emails often appear to come from trusted sources (banks, managers, HR departments). They may contain:
- Fake invoices
- Password reset links
- Urgent notices about account problems
- Attachments that deliver malware
Nearly all major cyber incidents begin with a phishing email.
• Spear Phishing: highly targeted attacks
Unlike generic phishing, spear phishing is personalized. Attackers research their targets—often executives, HR staff, or finance employees—and craft convincing messages using real names, positions, or current projects.
Example:
An attacker poses as a CEO emailing the CFO requesting an urgent wire transfer.
• Vishing: voice-based scams
Attackers call victims pretending to be:
- IT support
- Bank representatives
- Government agencies
- Company leaders
The goal is to convince the employee to share information or take action, such as changing a password or providing account numbers.
• Tailgating: physical intrusion
An attacker gains access to a secured area by following an authorized employee through a locked door—often by:
- Pretending to be a delivery person
- Claiming they forgot their badge
- Carrying objects to appear trustworthy (e.g., boxes or equipment)
Once inside, they may steal devices, plug in malicious USB drives, or access sensitive rooms.
Activity: Identifying Social Engineering Techniques
Students are provided with sample phishing emails, voicemail scripts, or physical entry scenarios. They must:
- Identify the red flags
- Explain which type of social engineering is used
- Suggest how a trained employee should respond
This activity helps build practical recognition skills that students can use in future workplaces.
5.7 Leadership & Ethics
Leadership plays a critical role in shaping cybersecurity behavior throughout the organization. When leaders take security seriously, employees follow their example. When leaders ignore policies or treat cybersecurity as a low priority, the entire organization suffers.
How Leadership Shapes Cybersecurity Culture
• Setting expectations
Executives and managers must clearly communicate that cybersecurity is a shared responsibility. When expectations are explicit and consistent, employees understand that secure behavior is part of job performance.
• Demonstrating compliance
Leaders must follow the same rules they expect from employees:
- Using strong authentication
- Completing mandatory training
- Following data handling procedures
- Reporting suspicious incidents
When leaders model secure behavior, employees are far more likely to comply.
• Rewarding ethical behavior
Employees should feel supported when they:
- Report concerns
- Admit mistakes
- Ask for help
- Point out security gaps
Positive reinforcement encourages a culture where employees proactively contribute to security rather than hiding potential issues.
• Supporting transparency
If an incident occurs, leaders must communicate openly and responsibly. Concealing breaches, blaming individuals unfairly, or avoiding accountability erodes trust.
Transparent leadership helps organizations learn from incidents and improve resilience.
Why Ethics Matters in Cybersecurity
Ethical behavior impacts:
- Customer privacy
- Responsible handling of sensitive data
- Fair and transparent communication
- Trust within the organization
- Compliance with laws and regulations
Employees are far more likely to act ethically when leaders set the tone.
Conclusion: The Human Factor as a Strategic Advantage
Organizations that invest in employee awareness, social engineering resilience, ethical leadership, and a strong security culture gain a powerful advantage. Technology alone cannot stop attacks—but informed, engaged, and vigilant employees can significantly reduce risk.
In the end, cybersecurity is not just a technical challenge. It is a people challenge, and the strength of an organization’s human layer often determines whether it withstands or falls victim to modern cyber threats.
End-of-Chapter Case Study
Read The Untold Story of NotPetya, the Most Devastating Cyberattack in History:
https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
