From e-commerce sites to banking and government databases, the public trusts th

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

From e-commerce sites to banking and government databases, the public trusts that their information is secure once they’ve set up a password-protected account. When data breaches occur, it can cause serious security issues, such as when Equifax’s data breech impacted 147 million Americans (Federal Trade Commission, 2022). 
A manager must have the critical skill of employee relations and be able to integrate legal and ethical principles in the management of staff. The situations that managers and their employees face are frequently more about how you respond to them than what is happening. You must be able to manage employees and teams during periods of organizational change or even turmoil.
In this assessment, you are the manager when an employee reports that their corporate email account was hacked after they accepted an email from a fraudulent source. After this attack, a virus infected your organization’s servers and hackers had access to your organization’s data. 
Assessment Deliverable
Write a 525- to 700-word security breach report for the chief information officer (CIO) regarding the incident. Determine how you will manage the legal and ethical issues associated with the incident, including the following: 
Summarize how the security breach occurred and the accounts that have been hacked, including the legal and ethical issues of concern as a result of the incident. Be sure to include actions taken immediately following the breach. 
Recommend a notification process to the customers impacted by the security breach that includes recommendations for customers impacted by the security breach on how to secure their accounts.
Suggest a plan to report the incident to government authorities and to hire a cybersecurity contractor to restore the server security. 
Recommend a communication plan to notify internal employees of the incident and address related employee expectations. 
Recommend a training plan for employees about cybersecurity. 
Recommend strategies to monitor cybersecurity-related employee activities to prevent a similar incident from happening in the future. 

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now