IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber InSecurity: A Post-Mortem Attempt to Assess Cyber Problems from IT and Business Management Perspectives

Author(s): Angela Hollman (University of Nebraska at Kearney, Kearney, NE, USA), Sonja Bickford (Department of Industrial Technology, University of Nebraska at Kearney, Kearney, NE, USA)and Travis Hollman (Hollman Media, LLC, Kearney, NE, USA)
Copyright: 2017
Pages: 29
EISBN13: 9781522553533

Purchase


View Sample PDF


Abstract

Jane, a veteran Accounting employee at Sachem Manufacturing, Inc., recently fell victim to a phishing attack that infected her computer with ransomware. Jane then furthered the attack by logging into key company systems perpetuating the problem. A series of frantic phone calls followed as staff from Information Technology (IT) scrambled to understand the problem and put the broken pieces back together. Unfortunately, the damage was too deep and the problem reached out to hinder a meeting that the CEO was having with an important client. Finger pointing, name calling, and head shaking took over the “War Room” as the top executives soon discovered that their managerial, technical, and political shortcomings were more ubiquitous than they cared to admit. The CEO blamed IT for not preventing the situation and for not communicating effectively with management in understandable terms. IT blamed the CEO for limiting necessary technical resources.

Related Content

Danielle Fowler, Paul Swatman, Tanya Castleman. © 2004. 12 pages.
Artur Siurdyban, Peter Axel Nielsen. © 2012. 13 pages.
Michael Sankey, Lynne Hunt. © 2014. 13 pages.
Teta Stamati, Athanasios Karantjias. © 2011. 22 pages.
Judith Symonds. © 2006. 16 pages.
Body Bottom