See discussions, stats, and author profiles for this publication at


Importance of cybersecurity training in organizations



Download 8,96 Mb.
Pdf ko'rish
bet144/195
Sana23.02.2022
Hajmi8,96 Mb.
#182707
1   ...   140   141   142   143   144   145   146   147   ...   195
Importance of cybersecurity training in organizations 
To avoid errors, employees should always be informed of the correct working methods, which in 
many cases can have serious consequences for both the hotel and the client. For example, there were 
cases when customer data was compromised through the hotel's Wi-Fi network, and cybercriminals 
could steal all of the hotel's personal information, including IDs and account information. The only 
problem is the violation of the profession. In some cases, hotels do not spend enough money on a 
good cybersecurity configuration that can prevent cyber-attacks. 


228 
Some advice that can be given to companies in the sector to navigate safely are: 
1. Update locks. Updates include systems that better prevent external threats from thieves or 
eliminate the need for automatic keys. 
2. Make time for safety meetings. Set a time to talk about the safety of your guests. Some of 
this time can also be spent watching video clips shot by the security source manufacturer. 
3. Evaluate and improve—quickly. Performs weekly real estate reviews. Solve any problems, 
even minor ones, that may occur during operation. Ignorance of a little negligence can lead to great 
problems. 
4. Upgrade to VLAN. A LAN, or local area network, is a network that connects computers. For 
many businesses that include Wi-Fi hotspots for customers. However, Wi-Fi, connected directly to 
the servers of your object, can pose a danger and create easy access for smart hackers. One way to 
increase cybersecurity is to create something called a VLAN or virtual network. Relatively 
inexpensive VLANs often do not require additional equipment. Installing this software can add 
another level of security between your servers and potential hackers. A common feature of virtual 
LANs is the ability to set multiple wireless network names that may have different levels of security. 
5. Beware of social engineering. Not all cyber threats occur on the Internet. Physical damage to 
social engineering and hotel computers poses a great risk. Change passwords every three months. 
Employees should also monitor physical access points to computers and property servers. Organize 
regular patrols to find people who are only in those parts of the property that belong to employees. 

Download 8,96 Mb.

Do'stlaringiz bilan baham:
1   ...   140   141   142   143   144   145   146   147   ...   195




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish