week 3 W3DQ Week 3 Discussion Question Discuss why it is more effective and less expensive to prevent security breach than to fix one after an attack. Your initial response is due by Thursday 11:59PM.

Hello Class,

As the purpose and essence of the attack are different and the structure of each organization is different, it should also be advised that the company prepares for the breach of the data before it occurs. Preventive measures are taken by the company in the case of a cybersecurity breach, such as having centralized data storage, confidential details, and event management services, and even data breach insurance. And they are less expensive than replacing one after the cyberattack. This, therefore, minimizes the disruption that the company would otherwise undergo. Steps that could be taken by a company to prepare for a security breach before it happens are given below (Dosal, 2018).

Run Security Policy Audit

Security audits play a crucial function in avoiding cybersecurity attacks. The company must identify all assets on the network as well as learn about the operating systems and apps they run. To reduce the risk of a breach occurring in the first place, they should identify key security loopholes in their network. This is also a crucial move to ensuring that they are best prepared to validate their most important data (Dosal, 2018).

Adding IPS / IDS to the Business Network

Company adding Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Event Management Services (SIEM) will provide early essential alerts of cyber-attacks on their network. And they make it easy for their information protection department to respond quickly to an emerging attack. That will improve the severity of the breach and facilitate the recovery process. They will be assisted in the post-attack evaluation. And, let them know how to deal with the attacker so that they can solve the vulnerability (Dosal, 2018).

Add Backup Data

 At least the most important backup of the documents should be provided by the company. So, they need to be backed up if the computer is corrupted by malware, mistakenly removed by human error, or damaged by the disaster. An effective data storage approach would be a cloud-based system that updates regularly to ensure a regularly updated Recover Point Objective (RPO) and a reliable Recover Point Objective (RTO) operating on remote company servers (Dosal, 2018).

Reference

Dosal, E. (2018). Why Preparation is Key for Quickly Recovering from a Security Breach.

Retrieved from

https://www.compuquip.com/why-preparation-is-key-for-quickly-recovering-from-a-security-breach

Thanks.