Mile2 Cybersecurity Certifications

OCU C)SP D Week 05 Lesson 10 Discussion

Viewing 10 reply threads
  • Author
    Posts
    • #65889
      Jessica Jagerson
      Keymaster

      Discuss the various risks and vulnerabilities companies face today as well as mitigating policies that help reduce a network compromise.

    • #110774
      Carlos Martes
      Participant

      Companies today face many cybersecurity risks such as phishing, malware, ransomware, insider threats and data breaches. These attacks can lead to stolen data, financial loss, and even damage to reputation. One major vulnerability comes from weak passwords, unpatched systems and lack of employee awareness. To reduce these risks, organizations should create strong security policies, such as enforcing multifactor authentication, using firewalls and antivirus protection and regular updating software. Employee training is also critical to help staff recognize suspicious emails or links. Companies should perform regular security audits and backups to recover data in case of an attack. Having an incident response plan ensures a quick reaction to any breach. By combining organizations can greatly lower their chances of network compromise and protect sensitive data from modern cyber threats.

      • #110976
        Misty Stewart
        Participant

        Cyber threats are growing more complex, affecting organizations of all sizes. Beyond technical flaws, human mistakes—like weak passwords and lack of awareness—often lead to breaches. A holistic cybersecurity approach combines advanced tools, regular employee training, frequent security checks, and clear incident response plans. These measures help protect assets and maintain trust.

    • #110814
      Mjulius513
      Participant

      When I worked at AWS, keeping the network secure was always a main priority. We used various methods to protect data and systems. Physical security measures included locked server rooms, security badges, and cameras to stop unauthorized access. Technical measures like firewalls, encryption, multi-factor authentication (MFA), and antivirus software helped block hackers and keep information safe. We also had administrative measures, such as password rules, access limits, and regular training for employees to ensure everyone followed security guidelines. Monitoring tools watched network activity and quickly spotted any unusual behavior or security threats. We regularly backed up data and had plans ready in case of a security breach or major system failure. Access controls ensured only authorized people could reach certain systems or data. By using all these layers of protection, AWS maintained a strong and secure network that kept both company and customer data safe and well-protected at all times.

      • #110908
        Trae Johnson
        Participant

        I agree that combining physical, technical, and administrative controls is the best approach to safeguard company and customer data. Your mention of monitoring tools is also crucial—continuous monitoring helps detect suspicious activity early, allowing faster response to potential threats. One additional measure that can strengthen such systems is conducting regular penetration testing. This practice allows security teams to identify weaknesses before attackers can exploit them, ensuring that policies and controls remain effective as new threats emerge.

      • #110979
        Willy Vazquez
        Participant

        Good post! I find it very interesting that you have your own job experience trying to keep everything secure. You bring up a lot of methods on how to keep information from being accessed not just on the network, but also in the physical way too with locked rooms and such.

    • #110887
      Addison West
      Participant

      Today, companies face many online risks that can lead to hackers breaking into their networks or stealing information. Some common threats include malware, phishing, ransomware, insider threats, and weak passwords. Malware is harmful software that can damage computers or steal data. Phishing happens when someone sends fake emails or messages to trick people into giving away personal information. Ransomware locks important files until the company pays money to the hacker. Insider threats happen when employees accidentally or purposely share or damage company data. Weak passwords or not using extra security steps like multi-factor authentication also make it easier for hackers to get in. To lower these risks, companies can follow good security practices. They should keep all their computers and software updated so hackers can’t use old weaknesses. Firewalls and antivirus programs help block attacks, and monitoring tools can warn the company if something unusual happens. Teaching employees how to spot fake emails and create strong passwords is also very important. Companies should limit who can see private information so fewer people can accidentally cause problems. Finally, backing up data and having a recovery plan helps businesses get their information back quickly after an attack. Even though cyberattacks are common today, companies can protect themselves by staying careful, keeping systems updated, and training employees to be smart about security.

      • #110907
        Trae Johnson
        Participant

        This post gives a clear and practical overview of the major cyber risks companies face today. I especially like that you mentioned employee training and limiting access—those are two of the most effective ways to prevent human error, which is often the weakest link in security. Another point worth adding is the importance of network segmentation. By dividing a company’s network into smaller, isolated sections, organizations can limit the damage if one part of the system is compromised. This makes it much harder for attackers to move laterally through the network and access critical systems or data.

    • #110906
      Trae Johnson
      Participant

      In today’s digital environment, companies face numerous risks and vulnerabilities that can compromise their networks and data. Some of the most common include malware, phishing, ransomware, insider threats, and unpatched software vulnerabilities. Malware and ransomware can encrypt or destroy valuable data, while phishing attacks often trick employees into revealing sensitive information or login credentials. Insider threats whether intentional or accidental can expose confidential data or provide attackers with internal access. Outdated software and weak passwords are also frequent entry points for cybercriminals.

      Reducing these risks, companies need to implement layered security policies. A strong Access Control Policy ensures that only authorized users can access certain systems or data. Patch Management Policies require regular software updates to close known vulnerabilities. Incident Response and Recovery Policies prepare organizations to quickly detect, respond to, and recover from attacks. Security Awareness Training is also essential employees should learn to recognize phishing emails, use strong passwords, and follow proper data-handling procedures. Finally, Backup and Disaster Recovery Policies guarantee that critical information can be restored in case of a cyberattack or data loss. By combining these proactive measures, companies can significantly reduce the likelihood and impact of a network compromise.

      • #110926
        Teisha Nolen
        Participant

        Hi Trae! Great post: you have clearly outlined the risks and responses to the cybersecurity threats that plague businesses today. I especially agree with the emphasis on layered security. No single tool or policy is enough on its own. This is the approach that is taken at the electric cooperative where I work. Security awareness training is often overlooked, but it’s critical since human error is a major vulnerability. I’d also add that continuous monitoring and regular audits help catch issues before they escalate. When companies combine technical controls with strong governance and employee engagement, they build real resilience. Great Summary!

      • #110946
        Mjulius513
        Participant

        I agree with your post because you explained the main risks companies face today very clearly. Cyber threats like phishing and ransomware can hurt businesses fast, especially if employees aren’t trained. I like how you mentioned layered security and regular updates—those are very important. Training workers and having backups really help keep data safe and secure.

    • #110916
      Derrick Adams
      Participant

      In today’s digital world, organizations face a wide range of risks and vulnerabilities that threaten the security of their networks. Risks represent the potential for loss or damage when weaknesses are exploited, while vulnerabilities are those weaknesses themselves whether in software, hardware, procedures, or human behavior. Common issues include outdated systems, weak passwords, poor access controls, and employees who fall victim to phishing or other forms of social engineering. These weaknesses give attackers the opportunity to steal information, disrupt operations, or damage an organization’s reputation.
      Reducing these risks starts with identifying critical assets and evaluating how likely each is to be compromised. Once vulnerabilities are understood, organizations can apply layered security controls to manage them. Technical measures such as firewalls, intrusion detection systems, encryption, and routine patching are crucial. However, technology alone isn’t enough. Administrative controls including clear policies, access management, security awareness training, and regular audits ensure that users follow safe practices.
      Strong security policies and consistent enforcement form the backbone of effective protection. By combining technical safeguards with well-trained personnel and a proactive approach to risk management, organizations can greatly reduce the likelihood of a network compromise and strengthen their overall security posture.

      • #110919
        Addison West
        Participant

        I think you explained this really well. I like how you pointed out that risks and vulnerabilities are not the same thing, but they are connected. Your explanation makes it clear that even the strongest technology still cannot protect a company if people are not trained and systems are not updated. I also agree with you that a layered approach is important, because one single tool is never enough to stop every attack. The part about employees getting tricked by phishing is very true, human mistakes are still one of the biggest reasons attacks succeed. In my opinion, building a strong security culture takes time, but it makes a huge difference. When companies combine good tools, good policies, and good training like you mentioned, they have a much better chance of staying protected.

    • #110925
      Teisha Nolen
      Participant

      Businesses today face all kinds of cyber threats – hackers, scams, viruses, and even mistakes made by their own employees. With more people working from home and using personal devices, it’s easier than ever for attackers to find weak spots. Common problems include phishing emails that trick people into giving up passwords, outdated software that hasn’t been patched, and cloud systems that aren’t set up securely.
      To protect against these risks, businesses need smart, layered defenses. That means using strong passwords with multi-factor authentication, keeping software up to date, and limiting who has access to what. Training employees to spot suspicious emails is also key. Tools like firewalls, antivirus software, and monitoring systems help catch threats early. I am a firm believer in the “zero trust” approach – don’t automatically trust anyone or anything trying to connect to your network.
      At the end of the day, staying safe online takes a mix of good tools, clear policies, and people who know what to watch for. It’s not about being perfect – it’s about being prepared.

      • #110939
        Derrick Adams
        Participant

        Teisha, I really like how you highlighted the impact of remote work on network vulnerabilities. That’s something a lot of companies still underestimate. You’re absolutely right that people using personal devices or unsecured home networks make it easier for attackers to find those weak spots. I also agree with your point about the zero trust approach it’s becoming a cornerstone of modern cybersecurity for a reason. Assuming that no one and nothing is automatically trustworthy forces organizations to stay alert and validate every connection.

      • #111013
        Isabelle Tubbs
        Participant

        Hi, Teisha. Yes, a key part of creating these controls is to cover many different areas of access that hackers can try to use. There are many different ways they can do this, so a wide variety of security measures should be created too. Educating users, using MFA, and limiting access are some great ways to do this. Thanks for sharing.

    • #110932
      Caleb Kiser
      Participant

      Companies today deal with all kinds of risks to their networks, like phishing emails, malware, ransomware, insider threats, and outdated systems. Phishing is especially dangerous since it tricks employees into giving away passwords or sensitive info. Old or unpatched software also makes it easy for hackers to break in. To prevent this, companies should use strong security measures like multi-factor authentication, regular updates, and cybersecurity training for staff. Firewalls, network monitoring, and data backups also go a long way in keeping systems safe. The best defense is staying proactive by mixing good technology, smart policies, and educated users to stay ahead of potential attacks.

      • #110940
        Derrick Adams
        Participant

        Caleb, I really like how you broke this down especially the point about phishing being one of the most dangerous risks because it targets people rather than systems. That’s such an important reminder that even the best firewalls or antivirus programs can’t protect against human error. I also agree with your mention of data backups; that’s something companies sometimes overlook until it’s too late.

    • #110934
      Misty Stewart
      Participant

      Modern organizations encounter an ever-evolving landscape of cyber threats that can compromise the security and reliability of their digital assets. Threat actors exploit a variety of vulnerabilities, such as social engineering schemes like phishing, malicious software including ransomware, internal misuse, poorly configured infrastructure, unpatched applications, and newly discovered zero-day flaws. The growing adoption of cloud platforms and remote work arrangements has broadened the range of potential entry points, increasing the risk of unauthorized access.
      To address these challenges, businesses are turning to comprehensive defense strategies. These include implementing strict user permissions, deploying multi-factor authentication (MFA), maintaining up-to-date software, and fostering a culture of cybersecurity awareness among staff. Technologies like network segmentation, intrusion detection and prevention systems (IDPS), and advanced endpoint security solutions help contain and detect malicious activity before it spreads.

      • #110937
        Carlos Martes
        Participant

        Hello Misty,

        Modern organizations face increasing cyber threats that target vulnerabilities like phishing, malware, and unpatched systems. Implementing multi-layered defenses such as MFA, user access controls, updated software and employee awareness is essential. Technologies like IDPS and advanced endpoint security strengthen protection, helping businesses detect, contain and prevent attacks before major damage occurs.

    • #110978
      Willy Vazquez
      Participant

      There are a lot of vulnerabilities that a company can face and the threats could all come from different directions. The more obvious threats would be attackers that will try to gain access in a variety of ways. One of the most common is phishing emails that try to trick employees to give up credentials or click on attachments that could be malware or spyware. Companies should train their employees to look out for suspicious emails and not click on random attachments in said emails to avoid this problem. A threat on the more technological side is outdated systems where there are vulnerabilities that attacker could exploit. Companies should make sure that their security and system are both up to date to help prevent these attacks that could leak sensitive data.

      • #110985
        Addison West
        Participant

        I think you explained this really well. Phishing is definitely one of the biggest threats because it targets the human side of security, and sometimes people do not even realize they are being tricked until it is too late. Training employees is extremely important, because even with the best technology, one wrong click can still cause a major breach. I also agree with your point about outdated systems. Attackers are constantly looking for old software with known weaknesses, so companies really do need to stay on top of updates and patches. Overall, both the human factor and the technology side have to be protected at the same time. When a company focuses on both user awareness and keeping systems properly maintained, it becomes much harder for attackers to break in.

    • #111011
      Isabelle Tubbs
      Participant

      Some risks to a company can be natural damage, like a natural disaster or an accident. What can be done to at least reduce the damage of this is to have physical controls in place in case something happens. For example, making sure everything in the building is up to code and that there is a plan for when something happens.
      A major threat to a company is the potential for hackers to add malware or crack passwords. Keeping up with updates and running antimalware are just a few ways to maintain security against malware, and creating good password policies for users can prevent passwords from being guessed so quickly or easily.
      Finally, it is important to prevent against attacks that are based in social engineering. Educating users to be wary of what information they give to people and how fake messages might look is a good way to reduce the effectiveness of this type of attack. Also, to reduce the damage that this can create, it is important not to give one person too much access on a system to begin with so that a potential hacker cannot get too much access either.

      • #111024
        Caleb Kiser
        Participant

        Hi Isabelle,

        You made great points about both physical and digital risks. I like how you included natural disasters since cybersecurity often overlooks those. Your emphasis on user education and limited access is spot-on—people are usually the weakest link, so awareness and layered permissions really help minimize potential damage.

Viewing 10 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.