Cyber InSecurity: A Post-Mortem Attempt to Assess Cyber Problems from IT and Business Management Perspectives

Angela Hollman (University of Nebraska at Kearney, Kearney, NE, USA), Sonja Bickford (Department of Industrial Technology, University of Nebraska at Kearney, Kearney, NE, USA) and Travis Hollman (Hollman Media, LLC, Kearney, NE, USA)
Copyright: © 2017 |Pages: 70
EISBN13: 9781522553533|DOI: 10.4018/JCIT.2017070104
OnDemand PDF Download:
$30.00
List Price: $37.50
OnDemand PDF Download
Download link provided immediately after order completion
$30.00
List Price: $37.50
Current Promotions:
20% off Autumn Sale

Abstract

Jane, a veteran Accounting employee at Sachem Manufacturing, Inc., recently fell victim to a phishing attack that infected her computer with ransomware. Jane then furthered the attack by logging into key company systems perpetuating the problem. A series of frantic phone calls followed as staff from Information Technology (IT) scrambled to understand the problem and put the broken pieces back together. Unfortunately, the damage was too deep and the problem reached out to hinder a meeting that the CEO was having with an important client. Finger pointing, name calling, and head shaking took over the “War Room” as the top executives soon discovered that their managerial, technical, and political shortcomings were more ubiquitous than they cared to admit. The CEO blamed IT for not preventing the situation and for not communicating effectively with management in understandable terms. IT blamed the CEO for limiting necessary technical resources.
InfoSci-OnDemand Powered Search