_Tishaun Jebanesan_ MIS 761

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

Student ID: 224307401 Student Name: Tishaun Jebanesan MIS761 – Cyber Security Strategies Year: 2024.

Scene 2 (9s)

Introduction. IT Consulting Services is a business entity stationed in New Zealand which deals with several clients in offering IT solutions. The sector has however registered growth due to advancements in technology and the necessity of solutions by digital means. Nonetheless, associated with these prospects are significant risks in the sphere of cybersecurity, notably, phishing attacks..

Scene 3 (28s)

Overview of IT Consulting Services. Current supplier of IT services in New Zealand. Uses 50 highly qualified employees in different IT faculties. Serves a hundred multiethnic clients such as small and medium enterprises and multinational companies (Li et al. 2021)..

Scene 4 (42s)

The Importance of Cybersecurity in IT Consulting.

Scene 5 (56s)

Understanding Phishing Attacks. Phishing attacks entail the use of fabricated communication. These attacks mostly involve the use of emails, Short Messaging System, or social sites in which the attacker disguises as a genuine entities (Ferlie & Ongaro, 2022). Intended to steal such delicate data as passwords..

Scene 6 (1m 14s)

Phishing Threats Faced by IT Consulting Services.

Scene 7 (1m 29s)

Consequences of Phishing Attacks. Situations that result in leakage of personal information. Damage in monetary terms resulting from fraud and the processes of recovering the losses (Engen, Fransson, Quist, & Skålén, 2021). Loss of clients’ confidence and distortion of the company’s reputation..

Scene 8 (1m 46s)

The Role of Employee Awareness. Employees are the core shield that an organisation has in preventing a phishing attack. Education improves the employee’s ability and knowledge in the identification process. An element of surprise contributes to high success rates of attacks; eradication of such a culture can be effective in lowering the attack success rates (Desolda et al, 2021)..

Scene 9 (2m 4s)

Implementing Shielding IT for Phishing Awareness.

Scene 10 (2m 21s)

Developing Response Protocols through Shielding IT.

Scene 11 (2m 39s)

Leveraging Technology Solutions. Shielding IT technology uses superior detection and filtering of emails. It will secure accounts that require a high level of security by using multi-factor authentication (Alkhalil et al. 2021). Always install updates in Shielding IT programs to eliminate possible holes..

Scene 12 (2m 55s)

Measuring the Effectiveness of Shielding IT Technology.

Scene 13 (3m 9s)

Conclusion. Phishing attacks pose significant risks to IT Consulting Services. Comprehensive awareness programs are essential for mitigation. A proactive cybersecurity approach safeguards employees and clients..

Scene 14 (3m 21s)

References. Ali, O., Ally, M., & Dwivedi, Y. (2020). The state of play of blockchain technology in the financial services sector: A systematic literature review. International Journal of Information Management, 54, 102199. Retrieved 1 August 2024 from: https://doi.org/10.1016/j.ijinfomgt.2020.102199 Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3, 563060. Retrieved 1 August 2024 from: https://doi.org/10.3389/fcomp.2021.563060 Alzuwaini, M. H., & Yassin, A. A. (2021). An Efficient Mechanism to Prevent the Phishing Attacks. Iraqi Journal for Electrical & Electronic Engineering, 17(1). Retrieved 1 August 2024 from: https://doi.org/10.1088/1757-899X/769/1/012072 Desolda, G., Ferro, L. S., Marrella, A., Catarci, T., & Costabile, M. F. (2021). Human factors in phishing attacks: a systematic literature review. ACM Computing Surveys (CSUR), 54(8), 1-35. Retrieved 1 August 2024 from: https://doi.org/10.1145/3469886 Engen, M., Fransson, M., Quist, J., & Skålén, P. (2021). Continuing the development of the public service logic: a study of value co-destruction in public services. Public Management Review, 23(6), 886-905. Retrieved 1 August 2024 from: https://doi.org/10.1080/14719037.2020.1720354 Ferlie, E., & Ongaro, E. (2022). Strategic management in public services organizations: Concepts, schools and contemporary issues. Routledge.https://doi.org/10.4324/9781003054917 Flavián, C., & Casaló, L. V. (2021). Artificial intelligence in services: current trends, benefits and challenges. The Service Industries Journal, 41(13-14), 853-859. Retrieved 1 August 2024 from: https://doi.org/10.1080/02642069.2021.1989177 Li, F., Lu, H., Hou, M., Cui, K., & Darbandi, M. (2021). Customer satisfaction with bank services: The role of cloud services, security, e-learning and service quality. Technology in Society, 64, 101487. Retrieved 1 August 2024 from: https://doi.org/10.1016/j.techsoc.2020.101487 Naqvi, B., Perova, K., Farooq, A., Makhdoom, I., Oyedeji, S., & Porras, J. (2023). Mitigation strategies against the phishing attacks: A systematic literature review. Computers & Security, 103387. Retrieved 1 August 2024 from: https://doi.org/10.1016/j.cose.2023.103387 Parker, H. J., & Flowerday, S. V. (2020). Contributing factors to increased susceptibility to social media phishing attacks. South African Journal of Information Management, 22(1), 1-10. Retrieved 1 August 2024 from: http://dx.doi.org/10.4102/sajim.v22i1.1176.