Skip to 0 minutes and 2 secondsBackground music . Lift opening noises. Background Music. Digital lock being unlocked. Background music and office sounds. Digital Scanning noises. High risk alarm noise bleeping. Background music and office sounds. Clicking of USB being inserted to laptop. Digital Scanning noises. High risk alarm noise bleeping. Background music and office sounds. Digital Scanning noises. High risk alarm noise bleeping. Background music and office sounds. Digital Scanning noises. High risk alarm noise bleeping. Background music and office sounds. Digital Scanning noises. High risk alarm noise bleeping. Background music and office sounds. Scrolling digital text noise. Background music.

Welcome to Week 2

Welcome to the second week of The Cyber Security Landscape. This week we will explore types of digital security risks, where they occur, who causes them and answer the following questions:

  • What are the risks around your data being lost or used by others?
  • What do you do when your data security has been breached?

As you can see in the video above, breaches in digital security can come in different forms, and is something all organisations should take seriously to protect themselves, their systems and their data.

Digital security risk

Digital security risk is a major issue for organisations worldwide. According to the Center for Strategic and International Studies, total global losses from cybercrime are in excess of $600 billion a year (2018). Cyber crime losses by UK retailers totalled £505 million in 2013 alone.

Cybercrime impacts organisations not only with financial losses but can lead to reputational damage, employee morale, trust with customers, regulatory issues and other damaging effects.

Your task

What do you do when your data security has been breached?

Share this video:

This video is from the free online course:

The Cyber Security Landscape

Coventry University