SlideShare a Scribd company logo
Article:
Issues Organizations face Regarding the Protection of Customer
Information.
Nowadays, Organizations’ are faced with the
challenge of protecting their customer’s information. Terrorist
attacks, floods, fires and other disasters are among the problems
that firms face regarding data protection (Pereira & Santos,
2014). These tragedies can damage information processing
facilities and crucial documents of the clients. Loss of the
organization’s information and theft can also result in negative
impacts on customer confidence, the profitability of the
company and business reputation (So, 2011). For example, a
security breach that leads to the leakage of user’s credit card
information can have an adverse impact on the card payment as
a result of cancellation and re-processing of compromised cards.
The above procedure is costly. The identity theft is
becoming one of the highest information crimes including loss
of consumer’s data by the institution managing it. Cyber-attack
is another common issue that organizations are struggling to
control for the confidentiality of the customers’ information
(Pereira & Santos, 2014). Some attacks like phishing are
conducted with the aim of stealing personal data.
Regardless of whether the thief intending to attack the
organization is an insider or an outsider, the fact remains that
the secrets and vital information are at risk; this includes the
customer’s valuable data. Businesses are also experiencing the
problem of system breakdown that leads to the loss of the
client’s information (Pereira & Santos, 2014). Although the
rates of these security issues are currently escalating, the
corporations need to take accurate measures to ensure that its
Information Technology infrastructure is secure in a way that it
can protect the customers’ data.
ArticleIssues Organizations face Regarding the Protection of Cu.docx

More Related Content

Similar to ArticleIssues Organizations face Regarding the Protection of Cu.docx

Running Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
todd271
 
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
ijsc
 
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
ijsc
 
DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali Rangoliya
NSConclave
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
EMC
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
- Mark - Fullbright
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
randyburney60861
 
Introduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxIntroduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docx
normanibarber20063
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
CSCJournals
 
Discussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docxDiscussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docx
cuddietheresa
 
How to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdfHow to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdf
rohit219406
 
Risky Business
Risky BusinessRisky Business
Risky Business
Samantha Park
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Ethan S. Burger
 
Data Theft.pdf
Data Theft.pdfData Theft.pdf
Data Theft.pdf
Computer IT Disposals
 
Edwin A1 poster (2)
Edwin A1 poster (2)Edwin A1 poster (2)
Edwin A1 poster (2)
Edwin Mmako
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
kamranrazzaq8
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
The Economist Media Businesses
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
Alexander Decker
 

Similar to ArticleIssues Organizations face Regarding the Protection of Cu.docx (20)

Running Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
 
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
 
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
 
DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali Rangoliya
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
 
Introduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxIntroduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docx
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Discussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docxDiscussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docx
 
How to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdfHow to secure information systemsSolutionAnswerInformation.pdf
How to secure information systemsSolutionAnswerInformation.pdf
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
Data Theft.pdf
Data Theft.pdfData Theft.pdf
Data Theft.pdf
 
Edwin A1 poster (2)
Edwin A1 poster (2)Edwin A1 poster (2)
Edwin A1 poster (2)
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 

More from rossskuddershamus

As a human resources manager, you need to advise top leadership (CEO.docx
As a human resources manager, you need to advise top leadership (CEO.docxAs a human resources manager, you need to advise top leadership (CEO.docx
As a human resources manager, you need to advise top leadership (CEO.docx
rossskuddershamus
 
As a homeowner, you have become more concerned about the energy is.docx
As a homeowner, you have become more concerned about the energy is.docxAs a homeowner, you have become more concerned about the energy is.docx
As a homeowner, you have become more concerned about the energy is.docx
rossskuddershamus
 
As a healthcare professional, you will be working closely with o.docx
As a healthcare professional, you will be working closely with o.docxAs a healthcare professional, you will be working closely with o.docx
As a healthcare professional, you will be working closely with o.docx
rossskuddershamus
 
As a future teacher exposed to the rising trend of blogs and adv.docx
As a future teacher exposed to the rising trend of blogs and adv.docxAs a future teacher exposed to the rising trend of blogs and adv.docx
As a future teacher exposed to the rising trend of blogs and adv.docx
rossskuddershamus
 
As a fresh research intern, you are a part of the hypothetical.docx
As a fresh research intern, you are a part of the hypothetical.docxAs a fresh research intern, you are a part of the hypothetical.docx
As a fresh research intern, you are a part of the hypothetical.docx
rossskuddershamus
 
As a fresh research intern, you are a part of the hypothetical Nat.docx
As a fresh research intern, you are a part of the hypothetical Nat.docxAs a fresh research intern, you are a part of the hypothetical Nat.docx
As a fresh research intern, you are a part of the hypothetical Nat.docx
rossskuddershamus
 
As a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docxAs a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docx
rossskuddershamus
 
As a doctorally prepared nurse, you are writing a Continuous Qua.docx
As a doctorally prepared nurse, you are writing a Continuous Qua.docxAs a doctorally prepared nurse, you are writing a Continuous Qua.docx
As a doctorally prepared nurse, you are writing a Continuous Qua.docx
rossskuddershamus
 
As a consumer of information, do you generally look for objectivity .docx
As a consumer of information, do you generally look for objectivity .docxAs a consumer of information, do you generally look for objectivity .docx
As a consumer of information, do you generally look for objectivity .docx
rossskuddershamus
 
As a center of intellectual life and learning, Timbuktua. had ver.docx
As a center of intellectual life and learning, Timbuktua. had ver.docxAs a center of intellectual life and learning, Timbuktua. had ver.docx
As a center of intellectual life and learning, Timbuktua. had ver.docx
rossskuddershamus
 
ary AssignmentCertified medical administrative assistants (CMAAs) .docx
ary AssignmentCertified medical administrative assistants (CMAAs) .docxary AssignmentCertified medical administrative assistants (CMAAs) .docx
ary AssignmentCertified medical administrative assistants (CMAAs) .docx
rossskuddershamus
 
As (or after) you read The Declaration of Independence, identify.docx
As (or after) you read The Declaration of Independence, identify.docxAs (or after) you read The Declaration of Independence, identify.docx
As (or after) you read The Declaration of Independence, identify.docx
rossskuddershamus
 
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docxARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
rossskuddershamus
 
AS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docxAS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docx
rossskuddershamus
 
arugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docxarugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docx
rossskuddershamus
 
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docxartsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
rossskuddershamus
 
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docxARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
rossskuddershamus
 
ARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docxARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docx
rossskuddershamus
 
Artist Analysis Project – Due Week 61)Powerpoint project at le.docx
Artist Analysis Project – Due Week 61)Powerpoint project at le.docxArtist Analysis Project – Due Week 61)Powerpoint project at le.docx
Artist Analysis Project – Due Week 61)Powerpoint project at le.docx
rossskuddershamus
 
Artist Research Paper RequirementsYou are to write a 3 page double.docx
Artist Research Paper RequirementsYou are to write a 3 page double.docxArtist Research Paper RequirementsYou are to write a 3 page double.docx
Artist Research Paper RequirementsYou are to write a 3 page double.docx
rossskuddershamus
 

More from rossskuddershamus (20)

As a human resources manager, you need to advise top leadership (CEO.docx
As a human resources manager, you need to advise top leadership (CEO.docxAs a human resources manager, you need to advise top leadership (CEO.docx
As a human resources manager, you need to advise top leadership (CEO.docx
 
As a homeowner, you have become more concerned about the energy is.docx
As a homeowner, you have become more concerned about the energy is.docxAs a homeowner, you have become more concerned about the energy is.docx
As a homeowner, you have become more concerned about the energy is.docx
 
As a healthcare professional, you will be working closely with o.docx
As a healthcare professional, you will be working closely with o.docxAs a healthcare professional, you will be working closely with o.docx
As a healthcare professional, you will be working closely with o.docx
 
As a future teacher exposed to the rising trend of blogs and adv.docx
As a future teacher exposed to the rising trend of blogs and adv.docxAs a future teacher exposed to the rising trend of blogs and adv.docx
As a future teacher exposed to the rising trend of blogs and adv.docx
 
As a fresh research intern, you are a part of the hypothetical.docx
As a fresh research intern, you are a part of the hypothetical.docxAs a fresh research intern, you are a part of the hypothetical.docx
As a fresh research intern, you are a part of the hypothetical.docx
 
As a fresh research intern, you are a part of the hypothetical Nat.docx
As a fresh research intern, you are a part of the hypothetical Nat.docxAs a fresh research intern, you are a part of the hypothetical Nat.docx
As a fresh research intern, you are a part of the hypothetical Nat.docx
 
As a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docxAs a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docx
 
As a doctorally prepared nurse, you are writing a Continuous Qua.docx
As a doctorally prepared nurse, you are writing a Continuous Qua.docxAs a doctorally prepared nurse, you are writing a Continuous Qua.docx
As a doctorally prepared nurse, you are writing a Continuous Qua.docx
 
As a consumer of information, do you generally look for objectivity .docx
As a consumer of information, do you generally look for objectivity .docxAs a consumer of information, do you generally look for objectivity .docx
As a consumer of information, do you generally look for objectivity .docx
 
As a center of intellectual life and learning, Timbuktua. had ver.docx
As a center of intellectual life and learning, Timbuktua. had ver.docxAs a center of intellectual life and learning, Timbuktua. had ver.docx
As a center of intellectual life and learning, Timbuktua. had ver.docx
 
ary AssignmentCertified medical administrative assistants (CMAAs) .docx
ary AssignmentCertified medical administrative assistants (CMAAs) .docxary AssignmentCertified medical administrative assistants (CMAAs) .docx
ary AssignmentCertified medical administrative assistants (CMAAs) .docx
 
As (or after) you read The Declaration of Independence, identify.docx
As (or after) you read The Declaration of Independence, identify.docxAs (or after) you read The Declaration of Independence, identify.docx
As (or after) you read The Declaration of Independence, identify.docx
 
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docxARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
 
AS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docxAS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docx
 
arugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docxarugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docx
 
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docxartsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
 
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docxARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
 
ARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docxARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docx
 
Artist Analysis Project – Due Week 61)Powerpoint project at le.docx
Artist Analysis Project – Due Week 61)Powerpoint project at le.docxArtist Analysis Project – Due Week 61)Powerpoint project at le.docx
Artist Analysis Project – Due Week 61)Powerpoint project at le.docx
 
Artist Research Paper RequirementsYou are to write a 3 page double.docx
Artist Research Paper RequirementsYou are to write a 3 page double.docxArtist Research Paper RequirementsYou are to write a 3 page double.docx
Artist Research Paper RequirementsYou are to write a 3 page double.docx
 

Recently uploaded

Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 

Recently uploaded (20)

Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 

ArticleIssues Organizations face Regarding the Protection of Cu.docx

  • 1. Article: Issues Organizations face Regarding the Protection of Customer Information. Nowadays, Organizations’ are faced with the challenge of protecting their customer’s information. Terrorist attacks, floods, fires and other disasters are among the problems that firms face regarding data protection (Pereira & Santos, 2014). These tragedies can damage information processing facilities and crucial documents of the clients. Loss of the organization’s information and theft can also result in negative impacts on customer confidence, the profitability of the company and business reputation (So, 2011). For example, a security breach that leads to the leakage of user’s credit card information can have an adverse impact on the card payment as a result of cancellation and re-processing of compromised cards. The above procedure is costly. The identity theft is becoming one of the highest information crimes including loss of consumer’s data by the institution managing it. Cyber-attack is another common issue that organizations are struggling to control for the confidentiality of the customers’ information (Pereira & Santos, 2014). Some attacks like phishing are conducted with the aim of stealing personal data. Regardless of whether the thief intending to attack the organization is an insider or an outsider, the fact remains that the secrets and vital information are at risk; this includes the customer’s valuable data. Businesses are also experiencing the problem of system breakdown that leads to the loss of the client’s information (Pereira & Santos, 2014). Although the rates of these security issues are currently escalating, the corporations need to take accurate measures to ensure that its Information Technology infrastructure is secure in a way that it can protect the customers’ data.