Tuesday, September 10, 2019

When Hackers Turn to Blackmail Article Example | Topics and Well Written Essays - 500 words

When Hackers Turn to Blackmail - Article Example Paul Layman, the CEO of Sunnylake, is in a quandary as to the options available to address the dilemma. Mr. Layman is faced with the following alternative courses of action: (1) pay the ransom fee of $100,00 to the hackers to immediately regain access to the system; (2) improve security system by changing access controls, installing power backups, increase defense in depth strategy, employ encryption of data during transmission, strengthen antivirus, power and data back-up systems, firewalls, employs a highly competent human resource, passwords, and other computer security software, as needed; (3) disclose critical information to stakeholders; and (4) go back to manual processing of health care records. After reviewing and evaluating the case facts including the expert advice of three commentators, Mr. Layman would be is the best position to do the following action. The advice of Richard L. Nolan is the most viable and consistent with the code of business ethics. First and foremost, Mr. Layman should decide once and for all that paying the hacker should not be considered at any cost. Conceding to their demands would make them vulnerable to future security breaches. Further there, there is no guarantee that these hackers would stick to their words. Concurrently, the stakeholders must be informed of the situation to make them aware of dilemma that hospital is currently addressing. At the same token, IT personnel must round the clock to upgrade and fully secure their information system to ensure that this would never happen in the future. The present system’s loopholes should all be corrected including installation of a dependable back up system and business continuity plan in case of emergency situations.  

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.