The Importance of Cyber Security in Organizations

18 January 2024

Why is cybersecurity a very important pillar for the sustainability of an organization? Cybersecurity is one of the foundations for ensuring business sustainability and the ethical standing of an organization. Data leaks, for example, will certainly affect an organization's reputation. By implementing strong cybersecurity procedures, organizations can increase user trust or what is known as user trust. In addition, organizations will be able to increase financial growth by reducing several cost components incurred due to the consequences of cyber attacks.

Organizations are not the only ones targeted in cyber attacks, it is also important to pay attention to the security of users, customers and related vendors to prevent possible events that could expose personally identifiable information (PII). PII is all information related to an individual's identity, for example name, email address, date of birth, residential address, internet protocol, IP address, and others. PII has a specific, more sensitive data type known as Sensitive Personally Identifiable Information (SPII). Some examples of data included in SPII include medical information, financial information, and biometric data. SPII information data leaks are more dangerous than PII data leaks. The motive that often arises from the act of stealing personal data or PII is none other than to gain financial gain for the perpetrator. Organizations need a security analyst to protect data, products and people, as well as ensure confidentiality and integrity of information. This is why the US Bureau of Labor Statistics estimates the need for cybersecurity professions will increase by more than 30% by 2030.

History of Cyber Attacks and Their Consequences

The cybersecurity industry is experiencing rapid development. Cyber security attackers, also known as threat actors or hackers, some of them carry out attacks using new methods, while others still use old methods. Understanding old methods of cyber security attacks can enable us to prevent data leaks and damage, and can make us better understand how important cyber security is in an organization.

In 1986, The Alvi Brothers created software known as the Brain Virus. The main purpose of this virus is to track illegal copies of health software. But in the end this virus became uncontrollable. When someone installs this health software without an official license, the Brain Virus in the software will infect the user's computer. Although the initial goal of this virus was to track illegal copies, over time this virus slowly damaged data and hardware on the user's computer. Without realizing it, this virus spread throughout the world in just a few months. This virus has a negative effect on productivity and has a negative impact on the running of business in many companies.

In 1988, Robert Morris created a program to determine developments in internet use. This program is placed on a web. The way this program works is that it installs itself automatically on computers connected to the internet network to count the number of computers connected to the internet. Very simple isn't it? Over time, this program failed in its function of tracking computers connected to the internet. This program "installs" itself repeatedly, causing the user's computer performance to become slow or even inoperable. Around 6 thousand computers at that time, were infected by this program, causing losses of millions of dollars to overcome this program infection. In the end this program became known as Morris Worm.

An incident occurred in 2000. It started with someone named Onel De Guzman, who created malware (software designed to infect computers) whose function was to steal user credential information including usernames and passwords. Users will receive an email with the subject "I Love You". Attached to the email was a file labeled "Love Letter For You". When the user opens the file, the malware in it will infect the computer, executing a series of command codes to gain access to username and password information. This malware is known as LoveLetter malware. LoveLetter malware infected around 45 million computers spread throughout the world and resulted in losses of around 10 million dollars in consequences. LoveLetter malware is the first example of a cyber attack method that is known to be the most effective for hackers, namely the Social Engineering Attacks method.

After knowing several series of cyber attacks that occurred in the past, of course it makes us more aware of how important cyber security is in today's digital era. Because of this, companies really need people who are experts in this field. The development of social media platforms makes it easier for hackers to obtain various personal information that can be used to carry out a series of social engineering attacks. They no longer need to infect users' devices via physical devices - flash disks for example, but simply via the internet network, hackers can infect malware on computers connected to the internet network. These hackers will always be around and they evolve along with advances in digital technology. We as organizations and individuals must always be ready to stand on the front line to maintain business continuity from cyber attacks on the digital assets we own. Not only those who work in IT, but all of us must be able to play a role in protecting the digital data we have from cyber attacks.

 

Adityo Prabowo - IT Systems and Development at prasmul-eli

Why is cybersecurity a very important pillar for the sustainability of an organization? Cybersecurity is one of the foundations for ensuring business sustainability and the ethical standing of an organization. Data leaks, for example, will certainly affect an organization's reputation. By implementing strong cybersecurity procedures, organizations can increase user trust or what is known as user trust. In addition, organizations will be able to increase financial growth by reducing several cost components incurred due to the consequences of cyber attacks.

Organizations are not the only ones targeted in cyber attacks, it is also important to pay attention to the security of users, customers and related vendors to prevent possible events that could expose personally identifiable information (PII). PII is all information related to an individual's identity, for example name, email address, date of birth, residential address, internet protocol, IP address, and others. PII has a specific, more sensitive data type known as Sensitive Personally Identifiable Information (SPII). Some examples of data included in SPII include medical information, financial information, and biometric data. SPII information data leaks are more dangerous than PII data leaks. The motive that often arises from the act of stealing personal data or PII is none other than to gain financial gain for the perpetrator. Organizations need a security analyst to protect data, products and people, as well as ensure confidentiality and integrity of information. This is why the US Bureau of Labor Statistics estimates the need for cybersecurity professions will increase by more than 30% by 2030.

History of Cyber Attacks and Their Consequences

The cybersecurity industry is experiencing rapid development. Cyber security attackers, also known as threat actors or hackers, some of them carry out attacks using new methods, while others still use old methods. Understanding old methods of cyber security attacks can enable us to prevent data leaks and damage, and can make us better understand how important cyber security is in an organization.

In 1986, The Alvi Brothers created software known as the Brain Virus. The main purpose of this virus is to track illegal copies of health software. But in the end this virus became uncontrollable. When someone installs this health software without an official license, the Brain Virus in the software will infect the user's computer. Although the initial goal of this virus was to track illegal copies, over time this virus slowly damaged data and hardware on the user's computer. Without realizing it, this virus spread throughout the world in just a few months. This virus has a negative effect on productivity and has a negative impact on the running of business in many companies.

In 1988, Robert Morris created a program to determine developments in internet use. This program is placed on a web. The way this program works is that it installs itself automatically on computers connected to the internet network to count the number of computers connected to the internet. Very simple isn't it? Over time, this program failed in its function of tracking computers connected to the internet. This program "installs" itself repeatedly, causing the user's computer performance to become slow or even inoperable. Around 6 thousand computers at that time, were infected by this program, causing losses of millions of dollars to overcome this program infection. In the end this program became known as Morris Worm.

An incident occurred in 2000. It started with someone named Onel De Guzman, who created malware (software designed to infect computers) whose function was to steal user credential information including usernames and passwords. Users will receive an email with the subject "I Love You". Attached to the email was a file labeled "Love Letter For You". When the user opens the file, the malware in it will infect the computer, executing a series of command codes to gain access to username and password information. This malware is known as LoveLetter malware. LoveLetter malware infected around 45 million computers spread throughout the world and resulted in losses of around 10 million dollars in consequences. LoveLetter malware is the first example of a cyber attack method that is known to be the most effective for hackers, namely the Social Engineering Attacks method.

After knowing several series of cyber attacks that occurred in the past, of course it makes us more aware of how important cyber security is in today's digital era. Because of this, companies really need people who are experts in this field. The development of social media platforms makes it easier for hackers to obtain various personal information that can be used to carry out a series of social engineering attacks. They no longer need to infect users' devices via physical devices - flash disks for example, but simply via the internet network, hackers can infect malware on computers connected to the internet network. These hackers will always be around and they evolve along with advances in digital technology. We as organizations and individuals must always be ready to stand on the front line to maintain business continuity from cyber attacks on the digital assets we own. Not only those who work in IT, but all of us must be able to play a role in protecting the digital data we have from cyber attacks.

 

Adityo Prabowo - IT Systems and Development at prasmul-eli

Prasetiya Mulya Executive Learning Institute
Prasetiya Mulya Cilandak Campus, Building 2, #2203
Jl. R.A Kartini (TB. Simatupang), Cilandak Barat, Jakarta 12430
Indonesia
Prasetiya Mulya Executive Learning Institute
Prasetiya Mulya Cilandak Campus, Building 2, #2203
Jl. R.A Kartini (TB. Simatupang), Cilandak Barat,
Jakarta 12430
Indonesia