Skip to main content
  • Call Now
  • Request Info
  • Menu

Search form

  • JWU Main Site
  • jwuLink
  • Apply Now
  • Hide nav
  • Request Info
  • 1.855.598.1881

JWU College of Professional Studies

  • Academics
    Academics
    Academics Home Academic Calendar Online Catalog and Student Handbook On-Campus Programs
    • On Campus
    • Online
    • Business
      • BA - Communication
      • BS – Accounting
      • BS – Advertising & Marketing Communications
      • BS – Business Studies
      • BS – Digital Marketing & Social Media
      • BS – Fashion Merchandising & Retailing
      • BS – Food & Beverage Entrepreneurship
      • BS - Marketing
      • BSBA – Business Administration
      • BSBA – Entrepreneurship
      • BSBA – Human Resource Management
      • BSBA – International Business
      • BSBA – Management
      • BSBA – Operations & Supply Chain Management
      • BSBA – Enterprise Risk Management
      • MS – Global Tourism and Sustainable Economic Development
      • MS - Finance
      • BSBA - Leadership Studies
      • AS – Business Administration
      • BS – Finance
      • Doctor of Business Administration
      • Graduate Micro Certificate - Operations & Supply Chain Management
      • MS – Operations & Project Management
      • Undergraduate Micro Certificate - Business Communication
      • Undergraduate Micro Certificate - Communication for Change
      • Undergraduate Micro Certificate - Foundational Operations & Supply Chain Management
      • Undergraduate Micro Certificate - Technical Writing & Editing
      • Undergraduate Micro-Certificate - Accounting
    • Nonprofit Management
      • Graduate Certificate - Nonprofit Management
      • MS – Nonprofit Management
      • MPA – Nonprofit Management
      • MBA - Nonprofit Managment
    • Criminal Justice
      • MS – Criminal Justice
      • MPA – Criminal Justice
    • Political Science
      • BS - Political Science
    • Culinary Management
      • BS – Baking & Pastry Arts & Food Service Management
      • MS – Food Safety
      • BS – Culinary Arts & Food Service Management
      • Professional Certificate - Professional Craft Brewing
      • BS – Food & Beverage Entrepreneurship
      • BS – Food Industry Compliance Management
      • Bever<u>a</u>ge Service Manag<u>e</u>ment
    • Psychology
      • BS – Psychology
      • MBA – Organizational Psychology
      • MS – Organizational Psychology
    • Health Science
      • BS – Healthcare Administration
      • BS – Public Health
      • MS - Nutrition
      • Graduate Micro Certificate - Sports Nutrition
      • Undergraduate Micro Certificate - Public Health
    • Public Administration
      • MPA – General
      • MPA – Criminal Justice
      • MPA – Nonprofit Management
      • MPA – Homeland Security
      • MPA – Human Resource Management
    • Hospitality
      • BS – Food & Beverage Entrepreneurship
      • BS – Food Industry Compliance Management
      • BS – Hospitality Management
      • BS – Hotel & Lodging Management
      • BS – Sports, Entertainment, Event – Management
      • BS – Tourism & Hospitality Management
      • MBA – Hospitality
      • MS - Hospitality Management
      • MS – Global Tourism and Sustainable Economic Development
      • Graduate Certificate - Hospitality
      • Undergraduate Micro Certificate - Food Compliance
      • Undergraduate Micro Certificate - Quality Assurance in Hospitality
    • Sociology
      • BA - Sociology
    • HR Management
      • BSBA - Human Resource Management
      • MBA - Human Resource Management
      • MS – Human Resource Management
    • Sport Administration
      • BS – Sports, Entertainment, Event — Management
      • MBA – Sport Leadership
    • Liberal Studies
      • BS – Liberal Studies
    • Technology
      • BS – Computer Science
      • BS – Digital Marketing & Social Media
      • MBA – Information Security/Assurance
      • MS - Data Analytics
      • MS – Instructional Design & Technology
    • MBA
      • MBA - Event Leadership
      • MBA-Executive Communication
      • Master of Business Administration (MBA)
      • MBA – Finance
      • MBA – Hospitality
      • MBA – International Beverage Management
      • MBA – Human Resource Management
      • MBA – Information Security/Assurance
      • MBA – Organizational Psychology
      • MBA — Marketing
      • MBA – Operations & Supply Chain Management
      • MBA – Organizational Leadership
      • MBA – Nonprofit Management
      • MBA – Sport Leadership
      • MBA – General (One Year)
      • MBA – Global Fashion Merchandising Management
      • MBA – Project Management
  • Admissions
    Admissions
    JWU Admissions
    • Admissions Home
    • Undergraduate Admissions
    • Apply Online
    • Graduate Admissions
    • Transfer Students
    • Doctoral Admissions
    • On-Campus Admissions
    • International Admissions
    • Career Coach
    • Returning Students
    • Tuition and Fees
    • JWU Military
  • Financial Aid
    Financial Aid
    JWU Financial Aid
    • Financial Aid Home
    • Tuition and Fees
    • Scholarships and Grants
    • Military Benefits
  • Student Services
    Student Services
    JWU Student Services
    • Student Services Home
    • Academic Calendar
    • Career Resources
    • Academic Resources
    • Commencement
    • Technical Resources
  • Corporate Partnerships
    Corporate Partnerships
  • Blog
    Blog
  • About
    About
    About JWU
    • About JWU Professional Home
    • Read Student Testimonials
    • Tour an Online Classroom
    • Two JWU Grads, One MBA Journey
    • Learn from Experienced Faculty
    • Meet Our Team
    • Frequently Asked Questions
    • Discover the JWU Difference
    • Online Student Consumer Information
    • Priorities Survey for Online Learners
  • Apply Now
    Apply Now
  • jwuLink
    jwuLink
  • JWU Main Site
    JWU Main Site

You are here

JWU Professional > Blog > Five Cyber Security Risks to Know
Career Catalyst

Welcome to Career Catalyst, our blog featuring helpful continuing education and career-related articles written by our faculty and staff. From study and motivation tips to career planning and interview techniques, we cover it all. Make sure to check back regularly, because we’re always posting new articles designed to help you get more out of your education and career.

Follow Us
  • RSS
  • Facebook
  • Google Plus
  • Twitter
  • LinkedIn
  • PinInterest

Five Cyber Security Risks to Know

Five Cyber Security Risks to Know

February 18th, 2019
by JWU

Today’s most critical systems are tightly interwoven within a digital framework. This approach has dramatically improved efficiency, agility, and scalability ... but it also leaves key players vulnerable.

“People don't realize how routine operations are until they are not!” said Professor James Sheusi, who teaches at Johnson & Wales University Providence and online.  “For example, if there is a storm and your power goes out, you might light some candles or get out the flashlights, but I guarantee you the minute you go into another room, you still hit the light switch.  You know that you do.” He continued, “When there is an IT disruption, everyone is a mess—unless there is an excellent business continuity plan, and we teach that in the MBA – Information Security/Assurance program.”

What Is Cyber Security?

At its most basic level, cyber security involves the protection of digital networks and systems. Cyber security efforts aim to defend computers and servers against a whole host of threats. Without advanced security protocol, businesses may be vulnerable to lost data and considerable financial harm.

According to Professor Sheusi, threats to cyber security are becoming more prevalent because “the attack doesn’t have to be done onsite like a bank robbery. It is more anonymous and increasingly more profitable, and, because of its remote nature, it can be easily done without retribution.”

Why Is Computer Security Important?

Security threats can take many forms, ranging from the seemingly simple to hopelessly complex. While they range in sophistication, all threats hold the potential to impart considerable damage on a variety of businesses and organizations.

“There is long-term damage to the reputation of the business,” said Professor Sheusi, speaking on the complex implications of cyber attacks.  “Set aside customer data leaking out, which is obvious enough, but there are things like supply-chain disruptions, cash-flow disruptions, and so on. Then, there is the cost of remediation, embarrassment in the industry, and those kinds of problems no one thinks of.”

Here are five computer security risks that professionals watch out for:

1. Phishing Schemes

In an age of sophisticated cyberattacks, many people discount phishing schemes as a true threat. In reality, however, phishing remains one of the most prevalent and dangerous means of defrauding the digital community. Phishing involves fraudulent emails or other forms of communication sent in hopes of convincing recipients to reveal personal information such as passwords or credit card numbers. The 2018 State of the Phish report revealed that 76 percent of organizations suffered some form of a phishing attack in 2017.

A notable subset of phishing: SMiShing (short for SMS phishing), in which users are tricked into downloading viruses on their mobile devices. SMiShing presents a considerable threat, as people tend to be less wary in answering text messages than they are with email communication.

2. Ransomware

An especially dangerous form of malicious software, ransomware quickly takes over computer systems and encrypts essential documents, only returning access once a ransom has been paid. This scheme is far from new, but attacks have become shockingly prevalent in recent years. Experts at Cybersecurity Ventures predict that ransomware will cost the United States economy $11.5 billion in 2019.

3. Distributed Denial of Service

Often confused with ransomware, Distributed Denial of Service (DDoS) attacks involve a sudden flood of internet traffic intended to overwhelm servers. The goal? To render websites completely inoperable. In some cases, attackers stage mild DDoS attacks but threaten more severe efforts in hopes of securing a cryptocurrency ransom. According to a DDoS trends report from Neustar, the average DDoS attack costs targeted businesses $2.5 million.

4. Man-In-The-Middle Attacks

Eavesdropping now takes an alarming form with man-in-the-middle (MITM) attacks, in which attackers interfere with parties who believe they are interacting with one another. MITM attackers don't merely intercept messages—they alter them in hopes of gaining access to sensitive information or otherwise manipulating victims. MITM attacks can occur over email, via WiFi eavesdropping, or on mobile apps.

5. Cryptojacking

Cryptocurrency is supposed to be, by nature, more secure than traditional forms of currency. Unfortunately, the crypto industry appears to have spawned its own legion of threats. Cryptojacking, for example, occurs when devices are unknowingly used to mine cryptocurrency. Doesn't sound so bad, right? Think again. Recent cryptojacking efforts have targeted broader infrastructure. Security firm Radiflow, for example, discovered mining malware within the operational technology network for a European utility company. RedTeam Security's Marco Cardacci tells Wired, "Industrial control systems require high processor availability and any impact to that can cause serious safety concerns."

Contact Johnson & Wales University College of Online Education to learn more about the technology degree programs we offer that can help you compete in the world of digital security. Please complete the “Request Info” form on this page, call 855-JWU-1881, or email: onlineadmissions@jwu.edu

 

Blog Categories: 
Technology
February 18th, 2019
by JWU
Back to Blog
Featured Blogs

Online Culinary Program Partnership: Johnson & Wales University and Disney Aspire

July 6th, 2022 – Johnson & Wales University (JWU) and Disney Aspire, the Walt Disney Company’s education investment and... Read More

Choosing the MBA That’s Right for You: One-Year vs. Two-Year Programs

June 30th, 2022 – If you're considering going back to school to earn your Master of Business Administration (MBA), good for... Read More

22 Productivity Tips for College Students

June 30th, 2022 – Your time as a college student is likely one of the most important, exciting, and challenging chapters of... Read More

How College Students Can Improve Their Emotional Intelligence

June 30th, 2022 – Having high emotional intelligence (EI), also known as emotional quotient or EQ, can help college... Read More

10 Supply Chain Management Careers You Should Consider

June 30th, 2022 – Since the pandemic, supply chain issues have been in the news repeatedly. Something most of us took for... Read More

Older Stories
JWU's picture
AuthorJWU
  • Now accepting applications
  • Apply now
  • Admissions

Career Coach

Continue to Career Coach

You are now leaving Johnson & Wales’ (JWU) site and going to a site not operated by us. We are not responsible for the content or availability of any site other than our own.The information provided on the site is provided by Economic Modeling Specialists International (EMSI). EMSI has indicated to us the information provided is fair and reasonable. We do not make any representations or warranties, nor do we accept liability or responsibility, as to the accuracy or use of the information.  Additional links may also be provided, including those relating to employment opportunities. 

You are responsible for performing due diligence, such as ensuring the listings are for actual jobs and that your private and personal information are protected, when using or relying on information from any site.

 

Johnson & Wales University
115 Cedar St.
Providence, RI 02903
855.598.1881

© 2022 Johnson & Wales University
Privacy Policy  Nondiscrimination Policy

 

  • Contact Us
  • Accreditation & Approvals
  • Online Student Consumer Information
  • Catalogs
  • Handbooks
  • Facebook
  • YouTube
  • Twitter
  • Instagram
  • LinkedIn
  • Pinterest
Back to top