OCU C)SP D Week 05 Lesson 10 Discussion
- This topic has 23 replies, 11 voices, and was last updated 1 week, 1 day ago by
Caleb Kiser.
-
AuthorPosts
-
-
March 28, 2022 at 11:21 am #65889
Jessica Jagerson
KeymasterDiscuss the various risks and vulnerabilities companies face today as well as mitigating policies that help reduce a network compromise.
-
October 28, 2025 at 4:57 pm #110774
Carlos Martes
ParticipantCompanies today face many cybersecurity risks such as phishing, malware, ransomware, insider threats and data breaches. These attacks can lead to stolen data, financial loss, and even damage to reputation. One major vulnerability comes from weak passwords, unpatched systems and lack of employee awareness. To reduce these risks, organizations should create strong security policies, such as enforcing multifactor authentication, using firewalls and antivirus protection and regular updating software. Employee training is also critical to help staff recognize suspicious emails or links. Companies should perform regular security audits and backups to recover data in case of an attack. Having an incident response plan ensures a quick reaction to any breach. By combining organizations can greatly lower their chances of network compromise and protect sensitive data from modern cyber threats.
-
November 3, 2025 at 7:00 pm #110976
Misty Stewart
ParticipantCyber threats are growing more complex, affecting organizations of all sizes. Beyond technical flaws, human mistakes—like weak passwords and lack of awareness—often lead to breaches. A holistic cybersecurity approach combines advanced tools, regular employee training, frequent security checks, and clear incident response plans. These measures help protect assets and maintain trust.
-
-
October 30, 2025 at 6:26 am #110814
Mjulius513
ParticipantWhen I worked at AWS, keeping the network secure was always a main priority. We used various methods to protect data and systems. Physical security measures included locked server rooms, security badges, and cameras to stop unauthorized access. Technical measures like firewalls, encryption, multi-factor authentication (MFA), and antivirus software helped block hackers and keep information safe. We also had administrative measures, such as password rules, access limits, and regular training for employees to ensure everyone followed security guidelines. Monitoring tools watched network activity and quickly spotted any unusual behavior or security threats. We regularly backed up data and had plans ready in case of a security breach or major system failure. Access controls ensured only authorized people could reach certain systems or data. By using all these layers of protection, AWS maintained a strong and secure network that kept both company and customer data safe and well-protected at all times.
-
October 31, 2025 at 10:39 am #110908
Trae Johnson
ParticipantI agree that combining physical, technical, and administrative controls is the best approach to safeguard company and customer data. Your mention of monitoring tools is also crucial—continuous monitoring helps detect suspicious activity early, allowing faster response to potential threats. One additional measure that can strengthen such systems is conducting regular penetration testing. This practice allows security teams to identify weaknesses before attackers can exploit them, ensuring that policies and controls remain effective as new threats emerge.
-
November 3, 2025 at 8:13 pm #110979
Willy Vazquez
ParticipantGood post! I find it very interesting that you have your own job experience trying to keep everything secure. You bring up a lot of methods on how to keep information from being accessed not just on the network, but also in the physical way too with locked rooms and such.
-
-
October 30, 2025 at 8:53 pm #110887
Addison West
ParticipantToday, companies face many online risks that can lead to hackers breaking into their networks or stealing information. Some common threats include malware, phishing, ransomware, insider threats, and weak passwords. Malware is harmful software that can damage computers or steal data. Phishing happens when someone sends fake emails or messages to trick people into giving away personal information. Ransomware locks important files until the company pays money to the hacker. Insider threats happen when employees accidentally or purposely share or damage company data. Weak passwords or not using extra security steps like multi-factor authentication also make it easier for hackers to get in. To lower these risks, companies can follow good security practices. They should keep all their computers and software updated so hackers can’t use old weaknesses. Firewalls and antivirus programs help block attacks, and monitoring tools can warn the company if something unusual happens. Teaching employees how to spot fake emails and create strong passwords is also very important. Companies should limit who can see private information so fewer people can accidentally cause problems. Finally, backing up data and having a recovery plan helps businesses get their information back quickly after an attack. Even though cyberattacks are common today, companies can protect themselves by staying careful, keeping systems updated, and training employees to be smart about security.
-
October 31, 2025 at 10:38 am #110907
Trae Johnson
ParticipantThis post gives a clear and practical overview of the major cyber risks companies face today. I especially like that you mentioned employee training and limiting access—those are two of the most effective ways to prevent human error, which is often the weakest link in security. Another point worth adding is the importance of network segmentation. By dividing a company’s network into smaller, isolated sections, organizations can limit the damage if one part of the system is compromised. This makes it much harder for attackers to move laterally through the network and access critical systems or data.
-
-
October 31, 2025 at 10:35 am #110906
Trae Johnson
ParticipantIn today’s digital environment, companies face numerous risks and vulnerabilities that can compromise their networks and data. Some of the most common include malware, phishing, ransomware, insider threats, and unpatched software vulnerabilities. Malware and ransomware can encrypt or destroy valuable data, while phishing attacks often trick employees into revealing sensitive information or login credentials. Insider threats whether intentional or accidental can expose confidential data or provide attackers with internal access. Outdated software and weak passwords are also frequent entry points for cybercriminals.
Reducing these risks, companies need to implement layered security policies. A strong Access Control Policy ensures that only authorized users can access certain systems or data. Patch Management Policies require regular software updates to close known vulnerabilities. Incident Response and Recovery Policies prepare organizations to quickly detect, respond to, and recover from attacks. Security Awareness Training is also essential employees should learn to recognize phishing emails, use strong passwords, and follow proper data-handling procedures. Finally, Backup and Disaster Recovery Policies guarantee that critical information can be restored in case of a cyberattack or data loss. By combining these proactive measures, companies can significantly reduce the likelihood and impact of a network compromise.
-
November 2, 2025 at 11:01 am #110926
Teisha Nolen
ParticipantHi Trae! Great post: you have clearly outlined the risks and responses to the cybersecurity threats that plague businesses today. I especially agree with the emphasis on layered security. No single tool or policy is enough on its own. This is the approach that is taken at the electric cooperative where I work. Security awareness training is often overlooked, but it’s critical since human error is a major vulnerability. I’d also add that continuous monitoring and regular audits help catch issues before they escalate. When companies combine technical controls with strong governance and employee engagement, they build real resilience. Great Summary!
-
November 3, 2025 at 8:40 am #110946
Mjulius513
ParticipantI agree with your post because you explained the main risks companies face today very clearly. Cyber threats like phishing and ransomware can hurt businesses fast, especially if employees aren’t trained. I like how you mentioned layered security and regular updates—those are very important. Training workers and having backups really help keep data safe and secure.
-
-
October 31, 2025 at 5:51 pm #110916
Derrick Adams
ParticipantIn today’s digital world, organizations face a wide range of risks and vulnerabilities that threaten the security of their networks. Risks represent the potential for loss or damage when weaknesses are exploited, while vulnerabilities are those weaknesses themselves whether in software, hardware, procedures, or human behavior. Common issues include outdated systems, weak passwords, poor access controls, and employees who fall victim to phishing or other forms of social engineering. These weaknesses give attackers the opportunity to steal information, disrupt operations, or damage an organization’s reputation.
Reducing these risks starts with identifying critical assets and evaluating how likely each is to be compromised. Once vulnerabilities are understood, organizations can apply layered security controls to manage them. Technical measures such as firewalls, intrusion detection systems, encryption, and routine patching are crucial. However, technology alone isn’t enough. Administrative controls including clear policies, access management, security awareness training, and regular audits ensure that users follow safe practices.
Strong security policies and consistent enforcement form the backbone of effective protection. By combining technical safeguards with well-trained personnel and a proactive approach to risk management, organizations can greatly reduce the likelihood of a network compromise and strengthen their overall security posture.-
November 1, 2025 at 11:31 am #110919
Addison West
ParticipantI think you explained this really well. I like how you pointed out that risks and vulnerabilities are not the same thing, but they are connected. Your explanation makes it clear that even the strongest technology still cannot protect a company if people are not trained and systems are not updated. I also agree with you that a layered approach is important, because one single tool is never enough to stop every attack. The part about employees getting tricked by phishing is very true, human mistakes are still one of the biggest reasons attacks succeed. In my opinion, building a strong security culture takes time, but it makes a huge difference. When companies combine good tools, good policies, and good training like you mentioned, they have a much better chance of staying protected.
-
-
November 2, 2025 at 10:54 am #110925
Teisha Nolen
ParticipantBusinesses today face all kinds of cyber threats – hackers, scams, viruses, and even mistakes made by their own employees. With more people working from home and using personal devices, it’s easier than ever for attackers to find weak spots. Common problems include phishing emails that trick people into giving up passwords, outdated software that hasn’t been patched, and cloud systems that aren’t set up securely.
To protect against these risks, businesses need smart, layered defenses. That means using strong passwords with multi-factor authentication, keeping software up to date, and limiting who has access to what. Training employees to spot suspicious emails is also key. Tools like firewalls, antivirus software, and monitoring systems help catch threats early. I am a firm believer in the “zero trust” approach – don’t automatically trust anyone or anything trying to connect to your network.
At the end of the day, staying safe online takes a mix of good tools, clear policies, and people who know what to watch for. It’s not about being perfect – it’s about being prepared.-
November 2, 2025 at 9:10 pm #110939
Derrick Adams
ParticipantTeisha, I really like how you highlighted the impact of remote work on network vulnerabilities. That’s something a lot of companies still underestimate. You’re absolutely right that people using personal devices or unsecured home networks make it easier for attackers to find those weak spots. I also agree with your point about the zero trust approach it’s becoming a cornerstone of modern cybersecurity for a reason. Assuming that no one and nothing is automatically trustworthy forces organizations to stay alert and validate every connection.
-
November 4, 2025 at 11:21 am #111013
Isabelle Tubbs
ParticipantHi, Teisha. Yes, a key part of creating these controls is to cover many different areas of access that hackers can try to use. There are many different ways they can do this, so a wide variety of security measures should be created too. Educating users, using MFA, and limiting access are some great ways to do this. Thanks for sharing.
-
-
November 2, 2025 at 4:44 pm #110932
Caleb Kiser
ParticipantCompanies today deal with all kinds of risks to their networks, like phishing emails, malware, ransomware, insider threats, and outdated systems. Phishing is especially dangerous since it tricks employees into giving away passwords or sensitive info. Old or unpatched software also makes it easy for hackers to break in. To prevent this, companies should use strong security measures like multi-factor authentication, regular updates, and cybersecurity training for staff. Firewalls, network monitoring, and data backups also go a long way in keeping systems safe. The best defense is staying proactive by mixing good technology, smart policies, and educated users to stay ahead of potential attacks.
-
November 2, 2025 at 9:15 pm #110940
Derrick Adams
ParticipantCaleb, I really like how you broke this down especially the point about phishing being one of the most dangerous risks because it targets people rather than systems. That’s such an important reminder that even the best firewalls or antivirus programs can’t protect against human error. I also agree with your mention of data backups; that’s something companies sometimes overlook until it’s too late.
-
-
November 2, 2025 at 5:00 pm #110934
Misty Stewart
ParticipantModern organizations encounter an ever-evolving landscape of cyber threats that can compromise the security and reliability of their digital assets. Threat actors exploit a variety of vulnerabilities, such as social engineering schemes like phishing, malicious software including ransomware, internal misuse, poorly configured infrastructure, unpatched applications, and newly discovered zero-day flaws. The growing adoption of cloud platforms and remote work arrangements has broadened the range of potential entry points, increasing the risk of unauthorized access.
To address these challenges, businesses are turning to comprehensive defense strategies. These include implementing strict user permissions, deploying multi-factor authentication (MFA), maintaining up-to-date software, and fostering a culture of cybersecurity awareness among staff. Technologies like network segmentation, intrusion detection and prevention systems (IDPS), and advanced endpoint security solutions help contain and detect malicious activity before it spreads.-
November 2, 2025 at 8:06 pm #110937
Carlos Martes
ParticipantHello Misty,
Modern organizations face increasing cyber threats that target vulnerabilities like phishing, malware, and unpatched systems. Implementing multi-layered defenses such as MFA, user access controls, updated software and employee awareness is essential. Technologies like IDPS and advanced endpoint security strengthen protection, helping businesses detect, contain and prevent attacks before major damage occurs.
-
-
November 3, 2025 at 8:04 pm #110978
Willy Vazquez
ParticipantThere are a lot of vulnerabilities that a company can face and the threats could all come from different directions. The more obvious threats would be attackers that will try to gain access in a variety of ways. One of the most common is phishing emails that try to trick employees to give up credentials or click on attachments that could be malware or spyware. Companies should train their employees to look out for suspicious emails and not click on random attachments in said emails to avoid this problem. A threat on the more technological side is outdated systems where there are vulnerabilities that attacker could exploit. Companies should make sure that their security and system are both up to date to help prevent these attacks that could leak sensitive data.
-
November 3, 2025 at 10:34 pm #110985
Addison West
ParticipantI think you explained this really well. Phishing is definitely one of the biggest threats because it targets the human side of security, and sometimes people do not even realize they are being tricked until it is too late. Training employees is extremely important, because even with the best technology, one wrong click can still cause a major breach. I also agree with your point about outdated systems. Attackers are constantly looking for old software with known weaknesses, so companies really do need to stay on top of updates and patches. Overall, both the human factor and the technology side have to be protected at the same time. When a company focuses on both user awareness and keeping systems properly maintained, it becomes much harder for attackers to break in.
-
-
November 4, 2025 at 11:16 am #111011
Isabelle Tubbs
ParticipantSome risks to a company can be natural damage, like a natural disaster or an accident. What can be done to at least reduce the damage of this is to have physical controls in place in case something happens. For example, making sure everything in the building is up to code and that there is a plan for when something happens.
A major threat to a company is the potential for hackers to add malware or crack passwords. Keeping up with updates and running antimalware are just a few ways to maintain security against malware, and creating good password policies for users can prevent passwords from being guessed so quickly or easily.
Finally, it is important to prevent against attacks that are based in social engineering. Educating users to be wary of what information they give to people and how fake messages might look is a good way to reduce the effectiveness of this type of attack. Also, to reduce the damage that this can create, it is important not to give one person too much access on a system to begin with so that a potential hacker cannot get too much access either.-
November 4, 2025 at 10:56 pm #111024
Caleb Kiser
ParticipantHi Isabelle,
You made great points about both physical and digital risks. I like how you included natural disasters since cybersecurity often overlooks those. Your emphasis on user education and limited access is spot-on—people are usually the weakest link, so awareness and layered permissions really help minimize potential damage.
-
-
-
AuthorPosts
- You must be logged in to reply to this topic.