Two Employees tried to atack the Government sites |
|
The remaining two came from employees using office equipment to scan portals of U.S. government sites. Such scanning is the typical way hackers prepare an attack like denial of service. Before the events of September 11, such activity might not have stirred alarm, but it does now.
Fortunately, the Cleveland Clinic detected the scans with its security system before employees or outsiders trying to co-opt company computers could launch any attacks. The Federal Bureau of Investigation is currently looking into the case. Such incidents are troubling because they reveal that employees aren't always working on their employer's behalf. And in an era when practically every enterprise is connected to the Internet, the danger doesn't stop at the office door.
|
Hospitals need tighter security to protect patients records |
|
Certain industries require particularly strong security. Financial services and health care are at the top of the list. Companies in these sectors depend even more heavily than most on maintaining customers' trust. Says McCarthy, "The impact of a security breach on a Web banking company, Internet brokerage, insurance company, or hospital (if patient records got out), would be devastating."
Cleveland Clinic chief security officer Matt Speare agrees. He says that while patient records at his company have so far remained secure, if they were ever released through an accidental or deliberate security breach, the business would see a huge loss in its patient base. Once a breach occurs, the cost can be steep. The average large company loses $20,000 per hour during the first 72 hours of its response to a security breach, according to a recent study by Gartner. A 2001 Omni Consulting Group study claimed that leaky security costs companies between 6% and 7% of annual revenue. Such costs could include loss of business from system failure and decreased customer confidence, as well as increased insurance rates and expenditures of a public relations campaign to counter lost credibility. Moreover, companies or even company officers could be liable for failing to protect information systems and data.
|
Security programs can br updated regularly via Web |
|
One of the most common causes of network security breaches is the spread of viruses through e-mail. To remedy this problem at the Cleveland Clinic, Speare installed software that automatically scans incoming and outgoing e-mail. Yet security programs that protect firewalls and detect intruders won't help for long unless they are regularly updated and monitored. "Security threats are stealthy and always shifting," McCarthy says. "The right choice of technology creates a moving-defense system." Security is a realm where software as a service makes sense: Security programs can be updated regularly via the Web.
|
Anybody who read this case study can participate in the evaluation of this socail business concept |
To Evaluation This Socail Business |
Social Impact |
Mutual Help Model |
Social Inclusion |
Business Sustainability |
Replicability |
Evaluation Total |
Your Evaluation (1:Lowest to 5:Highest) |
3 |
3 |
3 |
3 |
3 |
3 |