This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Shopping

Data Breaches

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Data Breaches

Executive summary

Data breaching refers to the deliberate exposure of private information to cybercriminals or hackers. The purpose of this report is to recommend the best security app that the organization should use by comparing Avast Antivirus, Kaspersky Mobile Antivirus, and Norton Mobile Security. Protecting data breaching saves an organization from losing its reputation, incurring financial losses, and losing employees’ data in the hands of unauthorized persons such as cybercriminals. The report is guided by mixed methods which combine the elements of qualitative and quantitative research approaches. The report recommended that all employees install the Kaspersky Mobile Antivirus in their android phones and tablets as the best mobile security app.

The implementation plan in department manager writing a memo, sending a requisition for budgeting installation of the Kaspersky Mobile Antivirus app to the finance department, crediting employees’ accounts with the subscription fee for the one year plan, and the manager of the department to train employees on how to install and use the app. The report defines the background of the problem, discuss the three causes of the problem, and state the possible adverse effects of the problem. The report concludes by giving a signal that the plan is ending, restating the severity of the issue at hand, summarizing the recommendation with its benefits, painting a picture of a better future based on the solutions, and providing multiple avenues of contact information for your team.

Keywords: Data breaching, cybercriminals, hackers, Avast Antivirus, Kaspersky Mobile Antivirus, Norton Mobile Security, reputation, financial losses, personal information, mixed methods, qualitative data, quantitative data.

Don't use plagiarised sources.Get your custom essay just from $11/page

Data Breaches

Introduction

Losing data in the hands of unauthorized persons pose security threats in an organization. A data breaching can be defined as deliberate exposure of private information to unauthorized persons [1]. Therefore, an organization with an effective information security management system is less like to face the risks associated with data breaching. Some of the possible consequences associated with losing data in an organization include damaging reputation, incurring financial losses, and losing personal data [1]. Therefore, organizations are expected to adopt security measures that help in not only detecting fraudulent activities but also curbing data loss [1]. The purpose of this report is to recommend the best security app that the organization should use by comparing Avast Antivirus, Kaspersky Mobile Antivirus, and Norton Mobile Security.

Avast Antivirus

Avast Antivirus is one of the largest security companies in the world, using next-gen technologies to fight cyber-attacks in real-time [12]. Figure 1 shows Avast’s logo. The purposes of Avast antivirus is to protect devices against phishing attacks from emails, phone calls, infected websites, or SMS messages [15]. This means that the application was designed for all smartphone users seeking to protect their mobile phones against viruses and other types of malware [15]. Avast requires Android 5.0 and above operating system [15]. Its product features include antivirus engine, app insights, junk cleaner, photo vault, web shield, Wi-Fi security, and power save [15].

Avast’s historical journey commenced in 1988 when it was founded under the partnership between Pavel Baudis and Eduard Kucera to form the parent company known as Alwil cooperative. Later in 1991, Pavel and Eduard established Alwil as a company upon withdrawing from the rest of the cooperative [12]. In 1997, Avast entered the global market where it was licensed to McAfee after declining acquisition offer. Later in 2001, Avast declared to provide free antivirus with fully-featured security to all. Over the years, Avast’s achievements included opening its new Prague headquarters, acquiring fellow Czech-based cybersecurity giant AVG, featuring on the London Stock Exchange, and increasing its subscribers to 435 million. Finally, Avast welcomed its new CEO, Ondrej Vlcek appointed CEO, in 2019, to lead a new phase of growth [12].

Figure 1: Avast Antivirus logo

Kaspersky Mobile Antivirus

Kaspersky is a global cybersecurity company founded in 1997 by when Eugene Kaspersky discovered a virus called Cascade.1704 on his work computer, an Olivetti M24, and documented his first tool for eliminating the virus. The purpose of Kaspersky Mobile Antivirus is to keep phones and tablets – which can be even more vulnerable than computers – as well as private information secure from online dangers [16]. This means that the application was designed for all mobile phone users who want to protect their devices from Internet threats while you’re browsing by blocking phishing [16]. Its key product features include antivirus protection, background check, find my phone, anti-theft, app lock, anti-phishing, and web filter [16]. Kaspersky Mobile Antivirus requires Android 4.2 and above operating systems [16]. Its parent name is Kaspersky Antivirus [14]. Figure 2 shows the Kaspersky Mobile Antivirus logo.

The historical journey of Kaspersky Mobile Antivirus started on the 26th of June in 1997 when it was the established Kaspersky lab was established [14]. The company’s milestone is characterized by several achievements including launching handheld version of Kaspersky coming with Palm, Handspring, and Sony PDAs in 2001, opening international Kaspersky Lab offices, becoming the first company to update its antivirus databases hourly, successfully coping with many variations of the malware and helps users decrypt their files, discovering the first-ever Trojan for Mac OS X, improving and updating Kaspersky Anti-virus 6.0, introducing space security product line for business, named among the top 4 global leaders in Endpoint Security, discovering the first malware for ATMs, Backdoor.Win32.Skimer, developing a biochip implant and launching Kaspersky OS [14].

Figure 2: Kaspersky Mobile Antivirus logo

Norton Mobile Security

Norton Mobile Security is an application developed to detect and protect Android mobile phones against malware, viruses and threats such as malicious apps, theft, and websites designed to steal your information and money [17]. This means that the mobile security app targets all persons seeking protection for their Android devices against data breaches [17]. The key product features of Norton Mobile Security include Android Antivirus, Wi-Fi security, surveillance app protection, web protection, safe search, android system advisor, call blocking, and privacy report interactive map [17]. Norton Mobile Security requires Android 4.1 and above operating system [17]. Its parent name is Norton Mobile Security and Antivirus [17]. Figure 2 shows the Norton Mobile Security logo.

The evolution of the Norton Mobile Security started when Symantec launched Norton AntiVirus™ for PC after SAM partnered with Norton Utilities in 1991 [18]. In 1998, Norton 2000 entered the market where it was sued to examine the software in desktops by scanning for applications and data that could cause problems across the year 2000 date change [18]. In 2006, Norton launched Norton Internet Security™, which overwhelmed antivirus. The new security app had all the features of Norton Antivirus, including malware prevention and removal, email spam filtering, and phishing protection, along with features such as cookie removal and banner-ad blocking [18]. In 2014, Norton Security was launched, and it had four major products: Norton AntiVirus Basic, Norton Security Standard, Norton Security Deluxe, and Norton Security Premium. In 2018, New Norton™ 360 with LifeLock™ was launched, and it is expected to continue with the Norton Security evolution [18].

Figure 3: Norton Mobile Security logo

Background

A data breach refers to the deliberate exposure of private information to unauthorized persons [1]. A previous research study reveals that personal data within an organization encounter breaching, thus causing mass identity fraud [2]. Research study shows that outsiders are not the only one responsible for data breaches, even employees with an organization have been found guilty [3]. Anna Russell, VP at data protection and digital payments services provider Comforte AG, stated that “A research study from 2018 found that about one out of four data breaches is caused by employees rather than attackers from the outside” [3]. Russell reiterates that “Many organizations are well prepared to defend their perimeter against unauthorized access, but very few are equally well prepared against the risk of unauthorized data access by an insider” [3]. Therefore, organizations should not only focus on preventing data breached from outsiders but should also consider the possibility of an employee engaging data breaches.

Personally identifiable information (PII) is an example of sensitive personal information that can encounter data breaches. PII refers to the data that defines identity, location, or contact of a particular person [5]. These include all data defining a person’s identity names, birth dates, addresses, social security numbers, and phone numbers [5]. Unauthorized persons can use stolen PII to perform malicious activities such as applying for loans and filling deceitful income tax returns on behalf of the victim’s name [5]. Financial information, such as banking information, billing accounts, and insurance information, is another example of personal information prone to data breaches. Unauthorized persons can use stolen financial information to access accounts and perform fraudulent financial transactions on behalf of the victim’s name [5]. Healthcare information, education information, payment card information, and user credentials are, among other examples of personal information prone to data breaches [5]. Appendix 1 illustrates the likely scenarios for stolen personal information.

Poor password hygiene, such as using weak passwords, losing the passwords to the hands of authorized persons, or reusing the same password in different accounts causes data breaches in an organization. The Verizon report reveals that in 2017 that weak or stolen passwords contributed to more than 80 percent of hacking-related breaches in businesses [6]. On the other hand, the recent Verizon Data Breach Investigations Report revealed that more than 70% of employees reuse passwords at work [7]. Research shows that weak or stolen passwords are still prevalent today. The 2019 DBIR confirmed that there are not many changes witnessed concerning password-related data breaching cases, with 80% of them still connected to compromised and weak passwords [8]. The result provides evidence confirming that much need to be done on how to secure passwords as well as using strong passwords to have an improvement in the future.

Moreover, the current situation links youths to cases of poor password hygiene knowingly. PixelPrivacy.com reveals that Millennials between 18 and 31 years are the leading population associated with the poor password hygiene category. The research also shows that 87% of the Millennials admitted that they often reuse passwords intentionally [7]. Financial losses and damaging the organization’s reputation are among the consequences associated with poor password hygiene. Tracesecurity.com reveals that Equifax, a credit reporting agency, incurred a financial loss of nearly $450 to $600 million alongside uncountable hits to its reputation due to using a simple security patch [7]. Therefore, Equifax is tasked to conduct workshop training to its employees on how to improve their password hygiene to prevent the scenario from recurring in the future.

Cloud-based storage is another cause of data breaching. The rate of personal data breaches is high when using cloud-based storage to keep a large quantity of personal data [2]. This is because data stored in the cloud is prone to attack by hackers, thus making it difficult to protect. Moreover, the breached information is circulated and amasses in unauthorized hands, such as cybercriminals, which expedites an increasing erosion of personal privacy [2]. Results from Proofpoint study reveal that 72% of major cloud service tenants, such as Office 365 and G Suite cloud accounts have been hacked [3]. This confirms that personal data stored online are prone to attack by cybercriminals.

Cloud-based storage is becoming popular today. Cloud adoption statistics reveal that by 2020 a staggering 83% of the company workload will be stored on the cloud [9]. Losing personal information such as identity names, birth dates, addresses, social security numbers, and phone numbers in the hands of unauthorized persons is one of the consequences resulting from cloud-based data breaches. For example, Jennifer Lawrence and other celebrities had their private photos leaked online when the iCloud service they used for personal storage had been compromised [10]. Also, recently Pro wrestling giant WWE became the victim of a security breach leaked personal data for 3 million customers when it was reported that cybercriminal attacked unprotected Amazon cloud server [10]. Therefore, the organization should consider using alternative data storage devices other than the cloud to minimize data breaching in the future.

Personal devices such as mobile phones and laptops are another cause of data breaches in an organization. Verizon’s report shows that 2018 recorded 25% of healthcare organizations suffering from a mobile-related breach [4]. The Verizon report provides evidence confirming that the mobile phone is also vulnerable to personal data breaching. According to csoonline.com, mobile security is the leading cause of data breaching in every company’s these days [6]. Almost most workers today use their smartphones to access corporate data routinely. This increases the chances of sensitive information of an organization reaching the hands of unauthorized persons, especially when the phone is stolen [11].

Mobile phone data breaches result in the loss of personal information in the hands of unauthorized persons. For example, Francesca Bonafede, an EE customer, lost her home address and bank details to her ex-boyfriend, who switched the number to a new handset, altered her account details and sent fraudulent documentation in her name to his address [3]. The scenario started in February 2018 when the victim’s phone abruptly stopped functioning. An EE customer care later told the victim that an unknown person had visited one of the company’s shops, asked for a new SIM card and transferred the account to a new mobile phone, then used an address similar to that of her ex-partner to register [3]. The ex-boyfriend who worked at the EE Company started stalking her after he accessed her private data without consent [3]. Therefore, people should limit those accessing their phones to avoid losing personal information in the wrong hands.

Methodology

Purpose

The purpose of this report is to recommend the best security app that the organization should use by comparing Avast, Kaspersky Mobile Antivirus, and Norton Mobile Security. Mixed methods guide the report. It is a research method integrating the elements of qualitative and quantitative research approaches [19]. The reason for selecting mixed methods is that they ill create room for using both qualitative and quantitative data to describe the Avast, Kaspersky Mobile Antivirus, and Norton Mobile Security before recommending the best mobile security app to adopt. Quantitative data refers to numerical information requiring the use of words like how many, how much, or how often to describe a variable [20]. For example, quantitative data in the report includes the number of installs each application has. On the other hand, qualitative data refers to non-numerical information requiring the use of the word like “what type” to describe the mobile security application [20]. For example, qualitative data in the report includes the type of operating system each application required.

Description of the applications

Avast antivirus: its purpose is to protect devices against phishing attacks from emails, phone calls, infected websites, or SMS messages [15]. It has an average rating of 4.7 out of 5 from a total of 5,958,583 reviews with a minimum of 100 million installs [15]. Moreover, Avast Antivirus requires Android 5.0 and above operating system and occupies a space of 31M [15]. Besides, Avast Antivirus in-app products cost ranges between $1.19 and $80.29 per item, and its current version is 6.26.3 [15]. Avast antivirus has an “App Lock” that allows users to add a secret code to access their personal information. However, it lacks “Find my phone” feature that can be used to locate and lock lost or stolen Android devices and the “Anti-Phishing” feature, which protects financial information when shopping online.

Kaspersky Mobile Antivirus: its purpose is to keep phones and tablets and private information secure from online dangers [16]. It o has an average rating of 4.8 out of 5 from a total of 3,225,107 reviews with a minimum of 50 million installs [16]. Furthermore, Kaspersky Mobile Antivirus requires Android 4.2, and up the operating system and space it occupies varies with device [16]. Moreover, Kaspersky Mobile Antivirus in-app products cost ranges between $1.48 and $ 138.77 per item, and its current version is 11.41.4.2848 [16]. It has “Find my phone” feature to help in locating and locking lost or stolen Android devices, the “Anti-Phishing” feature which protects financial information when shopping online, as well as “App Lock” to enable users to add a secret code to access their private information [16].

Norton Mobile Security: its purpose is to detect and protect Android mobile phones against malware, viruses and threats such as malicious apps, theft, and websites designed to steal your information and money [17]. It has an average rating of 4.7 out of 5 from a total of 1,440,640 reviews with a minimum of 10 million installs [17]. Also, Norton Mobile Security requires Android 4.1 and above operating system and it and occupies a space of 28M [17]. Besides, Norton Mobile Security in-app products cost ranges between $1.98 and $ 40.64 per item, and its current version is 4.8.0.4503 [17]. However, it lacks the “Anti-Phishing” feature for protecting financial information when shopping online. It also lacks the “App Lock” and “Find my Phone” features.

Criteria of comparison

The areas of comparison include the number of installs, average app rating and the number of reviews, the operating system required, space occupied, current version, “App Lock” feature, ability to find lost or stolen Android device, and secure online shopping.

Comparing the applications

Table 1 shows a comparison between Avast Antivirus, Kaspersky Mobile Antivirus, and Norton Mobile Security based on seven criteria.

Table 1: Comparing mobile security applications

Criteria Avast antivirusKaspersky Mobile AntivirusNorton Mobile Security
Number of installs100+ million50+ million10+ million
Average app rating4.7 out of 54.8 out of 54.7 out of 5
Number of reviews5,958,5833,225,1071,440,640
Operating system requiredAndroid 5.0 and aboveAndroid 4.2 and aboveAndroid 4.1 and above
Space occupied31MVaries with device28M
Costs of in-app products$1.19 – $80.29 per item$1.48 – $ 138.77 per item$1.98 and $ 40.64 per item
Current version6.26.311.41.4.28484.8.0.4503
Find lost or stolenNoYesNo
“App Lock” featureYesYesNo
Secure online shoppingNoYesNo

Recommendations

Mixed methods integrate the elements of qualitative and quantitative research approaches [19]. Mixed methods were considered suitable to guide the report because it allows the research to use both qualitative and quantitative data to describe each application. Quantitative data used to describe each application included the number of installs, average app rating, number of reviews, space occupied, costs of in-app products, and current version. On the other hand, the qualitative data used to describe the type of operating system required by each application, and availability of “App Lock” feature, ability to find lost or stolen Android device, and secure online shopping.

The report recommends that all employees install the Kaspersky Mobile Antivirus app as the best mobile security application amongst the three. The first reason for recommending this mobile security app is that it has “Find my phone” feature to help in locating and locking lost or stolen Android devices [16]. Usually, an organization risks losing its data in the hands of unauthorized hands when employees’ devices used for professional purposes are lost or stolen. The study by the Ponemon Institute showed that companies had sustained data breaches as a result of lost or stolen employees’ devices [11]. This means that employees installing Kaspersky Mobile Antivirus saves the company from sustaining data security breaches if their Android phones or tablet are either stolen or lost.

The second reason for recommending Kaspersky Mobile Antivirus is that it has an “Anti-Phishing” feature, which protects financial information when shopping online [16]. This means that installing Kaspersky Mobile Antivirus guarantees its users to enjoy secure online shopping. Shape Security, a cybersecurity company, reported that hackers using stolen data contribute to nearly 90% of the login attempts made on online shopping websites. The report further shows that most of the data breaches were a result of hackers taking advantage of the faulty payment systems [21]. Therefore, people can have their online shopping secured when they install Kaspersky Mobile Antivirus.

Finally, Kaspersky Mobile Antivirus is recommended as the best mobile security app because it has an “App Lock,” which enables users to add a secret code to access their private information [16]. This means that one risks losing personal data when a person with ill intention holds a mobile phone without an app lock feature. For example, Francesca Bonafede, an EE customer, lost her home address and bank details to her ex-boyfriend who worked at the EE Company started stalking her after he accessed her data without consent [3]. This means that had Bonafede installed the Kaspersky Mobile Antivirus, the “App lock” would have required a password to be entered, thus preventing her ex-boyfriend from entering the password from accessing the personal information in the phone.

Implementation plan

Objectives of the implementation plan include: to save employees from data breaching when their Android devices are either lost or stolen, to protect employees’ financial information when shopping online, and to enable employees to add a secret code to access their private information. The plan starts with the department manager writing a memo, dated 16th March 2020, to all employees, alerting them of the company’s recommendation to have all personal Android phones or tablets install the Kaspersky Mobile Antivirus app, see the memo in appendix 2. On 17th March 2020, a requisition for budgeting the subscription fee of installing the Kaspersky Mobile Antivirus app then sent to the finance department. On 18th March 2020, employees’ accounts to be credited with the subscription fee for the one year plan. On 19th March 2020, the manager of the department to conduct training on how to use the Kaspersky Mobile Antivirus app. Finally, by 20th March 2020, all employees are expected to have the Kaspersky Mobile Antivirus app installed and functional in their Android phones and tablets. Figure 4 shows a summary of the implementation plan.

Figure 4: Summary of the implementation plan

The deliverables during the training session include how to make payments for the one year plan, how to use each feature of Kaspersky Mobile Antivirus, how to install the app, and the required package to choose. The outcome of the training include using: antivirus protection feature to clean virus, automatically blocking malware and more on Android phones and tablets, background check feature to scans on-demand and in real-time for viruses, spyware, ransomware and Trojans, find my phone feature to locates and locks Android phone or tablet when they are misplaced or stolen, anti-theft feature to protect personal information from reaching the hands of unauthorized persons by wiping it from the Android device, app lock feature to add a secret code to access for accessing personal information such as private messages and photos, anti-phishing feature to secure financial information secure when you shopping or banking online, and web filter feature to remove dangerous links and sites browsing online [16].

Conclusion

Now that all employees have installed and learn how to use Kaspersky Mobile Antivirus, they are expected to have their personal information protected against data breaching. Losing data in the hands of unauthorized persons pose security threats in an organization. The report recommended that all employees install the Kaspersky Mobile Antivirus app due to three reasons. One, it has the “Find my phone” feature to help in locating and locking lost or stolen Android devices [16]. Two, it has an “Anti-Phishing” feature, which protects financial information when shopping online [16]. Finally, the app has an “App Lock,” which enables users to add a secret code to access their private information [16]. The Kaspersky Mobile Antivirus can save the company from sustaining data breach as a result of lost or stolen employees’ devices in the future. Moreover, employees can have a secured online shopping and avoid losing their personal information in the hands of unauthorized persons.

 

 

 

 

 

References

[1] L. Cheng., L. Fang., and D. D. Liu., “Enterprise data breach: causes, challenges, prevention, and future directions: Enterprise data breach,” WIREs Data Mining Knowledge Discovery, 2017, pp. 1-14, 2017, doi: 10.1002/widm.12112017

[2] W. Spencer., M. Thomas, and S. Didier., “The extreme risk of personal data breaches & the erosion of privacy,” Physics of Condensed Matter, 89(1), 2015, doi: 10.1140/epjb/e2015-60754-4

[3] “The most infamous data breaches,” Apr 16, 2019. [Online]. Available: https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/ [Accessed February 29, 2020].

[4] J. Davis, “25% of Healthcare Providers Faced Mobile Device Breach in 2018,” Xtelligent Healthcare Media, March 08, 2019. [Online]. Available: https://healthitsecurity.com/news/25-of-healthcare-providers-faced-mobile-device-breach-in-2018 [Accessed February 29, 2020].

[5] “What do Hackers do with Your Stolen Identity?” June 21, 2017. [Online]. Available: https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/what-do-hackers-do-with-your-stolen-identity [Accessed February 29, 2020].

[6] J. Raphael., “8 mobile security threats you should take seriously in 2020,” CSO Online, February 25, 2020. [Online]. Available: https://www.csoonline.com/article/3241727/8-mobile-security-threats-you-should-take-seriously-in-2020.html?page=2 [Accessed March 1, 2020].

[7] “81% of company data breaches due to poor passwords,” August 14, 2018. [Online]. Available: https://www.tracesecurity.com/blog/articles/81-of-company-data-breaches-due-to-poor-passwords [Accessed March 1, 2020].

[8] A. Steel, “Passwords are still a problem according to the 2019 Verizon Data Breach Investigations Report,” The LastPass Blog, May 21, 2019. [Online]. Available: https://blog.lastpass.com/2019/05/passwords-still-problem-according-2019-verizon-data-breach-investigations-report.html/ [Accessed March 1, 2020].

[9] C. Radoslav, “Cloud computing statistics 2020,” Techjury, March 28, 2019. [Online]. Available: https://techjury.net/stats-about/cloud-computing/#gref [Accessed March 1, 2020].

[10] C. Bradford, “7 most infamous cloud security breaches,” StorageCraft Technology Corporation, n.d. [Online]. Available: https://blog.storagecraft.com/7-infamous-cloud-security-breaches/ [Accessed March 1, 2020].

[11] “The risks of staff using personal devices for work,” Leaders Choice Insurance Services, May 8, 2019. [Online]. Available: https://www.leaderschoiceinsurance.com/blog/the-risks-of-staff-using-personal-devices-for-work/ [Accessed March 1, 2020].

[12] “Our milestones and timeline,” Avast Foundation, n.d. [Online]. Available: https://www.avast.com/about#milestones-timeline-popup [Accessed March 1, 2020].

[13] “Avast Review,” Finances Online, n.d. [Online]. Available: https://reviews.financesonline.com/p/avast/ [Accessed March 1, 2020].

[14] “Kaspersky Lab turns 20: Key events and milestones,” AO Kaspersky Lab, July 19, 2017. [Online]. Available: https://www.kaspersky.com/blog/20-yo-timeline/17752/ [Accessed March 1, 2020].

[15] “Avast antivirus – scan & remove virus, cleaner,” Google, 28 February 2020. [Online]. Available: https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity [Accessed March 1, 2020].

[16] “Kaspersky antivirus: security, virus cleaner,” Google, 25 February 2020. [Online]. Available: https://play.google.com/store/apps/details?id=com.kms.free [Accessed March 1, 2020].

[17] “Norton Mobile Security and Antivirus,” Google, 28 February 2020. [Online]. Available: https://play.google.com/store/apps/details?id=com.symantec.mobilesecurity [Accessed March 1, 2020].

[18] C. Schubert, “The evolution of Norton™ 360: A brief timeline of cyber safety,” NortonLifeLock, n.d. [Online]. Available: https://us.norton.com/internetsecurity-how-to-the-evolution-of-norton-360-a-brief-timeline-of-digital-safety.html [Accessed March 1, 2020].

[19] J. Schoonenboom and R. B. Johnson, “How to Construct a Mixed Methods Research Design,” Kölner Zeitschrift für Soziologie und Sozialpsychologie, 69(7), pp. 1-25, 2017, doi: 10.1007/s11577-017-0454-1

[20] “Statistical language – quantitative and qualitative data,” Australian Bureau of Statistics, 4 July 2013. [Online]. Available: https://www.abs.gov.au/websitedbs/a3121120.nsf/home/statistical+language+-+quantitative+and+qualitative+data [Accessed March 1, 2020].

[21] T. Degonia, “2018 sees record number of online retail data breaches,” AT&T Cybersecurity, January 8, 2019. [Online]. Available: https://cybersecurity.att.com/blogs/security-essentials/2018-sees-record-number-of-online-retail-data-breaches [Accessed March 2, 2020].

 

 

 

 

Appendix

Appendix 1: Likely scenarios for stolen information

(Source: https://www.trendmicro.com)

 

 

 

Appendix 2

To: All employees

From: Manager of Department

Date: 16th March 2020

Subject: Training On How to Protect Our Android Devices

The company has realized that data breaches result from employees coming with their devices for professional purposes. A report written concerning the same issue recommended that all employees install Kaspersky Mobile Antivirus in their android phones and tablets.

All employees are therefore invited to attend a compulsory training on 19th March 2020 to learn how to install and use the Kaspersky Mobile Antivirus app. The items of discussion during the training session will include:

  • how to make payments for the one year plan,
  • how to use each feature of Kaspersky Mobile Antivirus,
  • how to install the app, and
  • the required package to subscribe.

The outcome of the training will include using the Kaspersky Mobile Antivirus to save employees from data breaching when their Android devices are either lost or stolen; secure their financial information when shopping online; add a secret code to access their private information, among others.

Thank you in advance for the time and effort you will invest in this training. Kindly feel free to send any follow-up questions to me at gg.gg@gmail.com.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask