The Importance of Cybersecurity Measures in Business Operations to Combat Phishing Attacks

Authors

  • Anish Bandapelli Gifted Gabber
  • Dr. Sarada Prasad
  • Jothsna Kethar Gifted Gabber

DOI:

https://doi.org/10.47611/jsrhs.v13i2.6783

Keywords:

Phishing, Spear Phishing, Cyber Threat, Cyber Attack, Supply Chain, Culture

Abstract

In an era where digital threats loom larger with each passing day, the security of business supply chains has become paramount to ensuring operational integrity and maintaining competitive advantage. This research paper delves into the critical role of cybersecurity within the complex networks of modern supply chains, aiming to highlight the multifaceted challenges and the necessity of robust defense mechanisms. Through a comprehensive analysis, this study identifies the main vulnerabilities that jeopardize the security and privacy of data and assets across interconnected business chains. Employing a mixed-methods approach, this research paper combines quantitative data on recent cyber incidents with qualitative insights from cybersecurity experts to explore effective strategies for mitigating risks. The findings reveal a significant correlation between the implementation of advanced cybersecurity protocols and the resilience of supply chains against cyber threats. Moreover, this study underscores the importance of collaborative efforts and shared responsibility among all supply chain stakeholders in fostering a secure digital ecosystem. The implications of this research extend beyond theoretical contributions, offering practical guidelines for businesses to enhance their cybersecurity posture and safeguard their supply chains against evolving digital threats. This paper not only adds to the body of knowledge on supply chain security but also serves as a call to action for organizations to prioritize cybersecurity in their strategic planning processes, ensuring the protection and privacy of their operations in the digital age.

Downloads

Download data is not yet available.

References or Bibliography

Abrams, L. (2023, January 18). MailChimp discloses new breach after employees got hacked. BleepingComputer. Retrieved February 7, 2024, from https://www.bleepingcomputer.com/news/security/mailchimp-discloses-new-breach-after-employees-got-hacked/

Alder, S. (2023, September 24). Common Indicators of a Phishing Attempt. The HIPAA Journal. Retrieved February 7, 2024, from https://www.hipaajournal.com/common-indicators-of-a-phishing-attempt/

Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3. https://doi.org/10.3389/fcomp.2021.563060

Badman, A. (2023, September 20). [Spear phishing vs. phishing: what's the difference?]. IBM. Retrieved February 7, 2024, from https://www.ibm.com/blog/spear-phishing-vs-standard-phishing-attacks/

Brown, M. (n.d.). The rising risk of cybercrime in the supply chain. Supply Chain XChange. Retrieved February 7, 2024, from https://www.thescxchange.com/articles/7239-the-rising-risk-of-cybercrime-in-the-supply-chain

CISA. (2021, February 1). What is Cybersecurity? Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/news-events/news/what-cybersecurity

CISA. (2023, March 17). Virus Basics. Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/news-events/news/virus-basics

Cordey, S. (2023). Software supply chain attacks: An illustrated typological review. ETH Zurich. https://doi.org/10.3929/ETHZ-B-000584947

Drexler, O. (2023, December 24). What Is Mailchimp and How To Use It in 2024 (Beginner's Guide). Mayple. Retrieved February 7, 2024, from https://www.mayple.com/blog/what-is-mailchimp

ENISA, Cadzow, S., Giannopoulos, G., Merle, A., Storch, T., & Vishik, C. Supply Chain Integrity, 2015.

Henriksson, J. (n.d.). Cyber Supply-Chain Security Challenges in the Context of Interorganizational Collaboration. https://www.diva-portal.org/smash/get/diva2:1606249/FULLTEXT01.pdf

IBM. (n.d.). What is a data breach? IBM. Retrieved February 7, 2024, from https://www.ibm.com/topics/data-breach

Imperva. (n.d.). Phishing attacks. imperva. Retrieved February 7, 2024, from https://www.imperva.com/learn/application-security/phishing-attack-scam/

MailChimp. (2023, January 13). Information About a Recent Mailchimp Security Incident [Press release]. https://mailchimp.com/newsroom/january-2023-security-incident/

Microsoft. (n.d.). What is business email compromise (BEC)? Microsoft. Retrieved February 7, 2024, from https://www.microsoft.com/en-us/security/business/security-101/what-is-business-email-compromise-bec#footnote1

NJCCIC. (2023, January 19). NJCCIC Data Breach Notification. New Jersey Cybersecurity & Communications Integration Cell. Retrieved February 7, 2024, from https://www.cyber.nj.gov/public-data-breaches/mailchimp

Smith, G. (2024, February 16). Top Phishing Statistics for 2024: Latest Figures and Trends. StationX. Retrieved February 22, 2024, from https://www.stationx.net/phishing-statistics/

United States Department of Justice, Federal Bureau of Investigation. (2021). International Crime Report 2021. Retrieved (February 7, 2024), from (https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf )

Published

05-31-2024

How to Cite

Bandapelli, A., Prasad, D. S. ., & Kethar, J. (2024). The Importance of Cybersecurity Measures in Business Operations to Combat Phishing Attacks. Journal of Student Research, 13(2). https://doi.org/10.47611/jsrhs.v13i2.6783

Issue

Section

HS Research Projects