Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Building on the Mitre Attack Enterprise Matrix

Introduction

There is always the chance for an employee who leaves a business would misuse any equipment that was provided to them by the company, such as a laptop. This might lead to data breaches or other security problems. By improving employee separation, a company may mitigate this risk. tightening a firm’s termination procedure to reduce employee abuse of company-issued electronic devices. This includes educating people, establishing technology solutions, and formulating a clear security methodology (Li et al., 2019). If a corporation takes these safeguards, it may secure its sensitive data and avoid security issues caused by workers misusing corporate equipment.

Handling of the Employment Separation to Mitigate Risks

Establishing clear standards for returning company-provided equipment is crucial. This policy should outline the procedures that an employee is required to perform when returning a device. These actions should include wiping any data that is stored on the device, disabling any remote access capabilities, and returning the device physically to the appropriate department or staff (Cyber Gray Matter, 2021). The policy needs to make it abundantly clear what the consequences are for either neglecting to return a device or failing to follow the appropriate processes for returning it. Another important step is to make sure that all employees are kept up to date on the regulations and procedures that must be followed when returning company-issued equipment as Li et al. (2019) state. This needs to be included in the procedure for onboarding new employees, and it must be periodically reinforced via training sessions or reminders.

A company may consider using technology solutions to assist in the return of work-issued equipment in addition to the policies and training that have already been implemented. If an employee fails to return a company-issued mobile device within a certain length of time, for example, the company could use a mobile device management (MDM) solution to remotely destroy all of the data stored on the device or disable the ability to access the device remotely (CDSE, 2022). Finally, the corporation must establish a policy for managing security risks caused by workers abusing corporate technology. This method should encompass investigating the issue, alerting impacted parties, and preventing future mishaps.

Policies and Procedures for Protecting an Organization from Risks

First is the policy option of using the principle of the least privilege is one that is successful. This idea emphasizes the fact that users should only have access to the data and systems that they need to successfully carry out their job responsibilities. It is possible to limit the risk of data breaches being caused either intentionally or unintentionally by restricting access to sensitive data and systems implemented (Cyber Gray Matter, 2021). Secondly, the implementation of a division of duties is yet another policy that should be. Because of this strategy, it is ensured that no one individual has complete command over an essential procedure or system. Instead, responsibilities are delegated to several different persons so that no one individual may amass an excessive amount of power.

Addressing Shannon Stafford’s Situation as a Manager

The Shannon Stafford situation presents a significant challenge for a manager of technological resources. Shannon, an employee in the Department of technology, has often missed deadlines and failed to complete prescribed obligations. Project delays and team productivity have resulted. Technology managers must handle this issue with competence, empathy, and effectiveness as well as quality. First, speak to Shannon one-on-one so she can comprehend. During the conversation, the technology manager should express concern about Shannon’s recent performance and ask about any underlying causes that may be contributing to the problem (Li et al., 2019). In addition, the technology manager should inquire about any potential contributing variables. Being empathic and likable is very necessary if you want Shannon to feel like she can trust you enough to open up and discuss the issue.

After gaining an in-depth grasp of the situation, the manager of technology should offer Shannon assistance in addressing any personal or professional issues that may be preventing them from performing to their full potential. Shannon may benefit from mentorship or training in time management and organizing. If the problem remains after assistance, it may be essential to escalating to a higher management level. Before increasing the problem, a recorded history and attempts to solve it are needed (Cyber Gray Matter, 2021). However, the resolution of the Shannon Stafford situation requires an approach that is both calculated and assertive in nature. A technology manager may be able to aid an employee in overcoming obstacles and recovering productivity.

Actions for Protecting Organization’s Technology and Data

Firewalls, intrusion detection systems, and anti-virus software are my top priorities. To avoid vulnerabilities and assaults, I would update every machine with the latest security patches and software. This was confirmed. In addition to these technological measures, I would prioritize employee training on typical cybersecurity risks including phishing, malware, and social engineering assaults. The staff may be better able to see potential security flaws and respond appropriately if they participate in frequent training sessions and simulations.

To guarantee that the company’s data can be recovered quickly and efficiently in the case of a data breach or other calamity, data backup and disaster recovery policies must be established. Examining these activities frequently ensures their success. Consider creating a security incident response strategy. In the case of a security breach, I would detail how to notify victims, investigate and contain the incident, and take remedial action (Li et al., 2019). Moreover, businesses may develop monitoring and auditing tools to recognize any conduct that is out of the norm on the part of privileged users. Monitoring access to essential systems and data as well as tracking any modifications made to the configuration of the system are required here.

According to CDSE (2022), regular security awareness training may be of assistance to privileged users in understanding the relevance of safeguarding an organization’s data and systems as well as their responsibilities in this regard. This training should cover a variety of topics, including those about the safeguarding of passwords, phishing attacks, and data protection best practices. Businesses may be better safeguarded against the specific dangers posed by privileged users if they adhere to the aforementioned regulations and procedures (Li et al., 2019). These methods ensure that access to sensitive data and systems is limited, regulated, and audited, hence reducing the possibility of data being compromised either accidentally or intentionally.

Conclusion

In conclusion, rules and procedures safeguard a corporation against hazards like data breaches caused by intentional or inadvertent actions. Least privilege and job division may reduce these risks. Internet technology resource managers may struggle to resolve employee performance issues. Shannon Stafford’s predicament must be handled professionally, compassionately, and efficiently. The manager should engage with Shannon, understand the challenges, encourage her, and offer guidance and tools to overcome obstacles and boost productivity. Technology managers may help individuals and teams succeed by being thoughtful and aggressive.

References

Center for Development of Security Excellence {CDSE}. (2022, December 10). CDSE Case Study Library. Retrieved from https://www.cdse.edu/Portals/124/Documents/casestudies/case-study-shannon-stafford.pdf

Cyber Gray Matter. (2021, Dec 9). Mitre Attack for Beginners [Video]YouTube. https://youtu.be/GYyLnff2XRo

Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management45, 13-24. DOI: 10.1016/j.ijinfomgt.2018.10.017

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics