The Importance of Cybersecurity Measures in Business Operations to Combat Phishing Attacks
DOI:
https://doi.org/10.47611/jsrhs.v13i2.6783Keywords:
Phishing, Spear Phishing, Cyber Threat, Cyber Attack, Supply Chain, CultureAbstract
In an era where digital threats loom larger with each passing day, the security of business supply chains has become paramount to ensuring operational integrity and maintaining competitive advantage. This research paper delves into the critical role of cybersecurity within the complex networks of modern supply chains, aiming to highlight the multifaceted challenges and the necessity of robust defense mechanisms. Through a comprehensive analysis, this study identifies the main vulnerabilities that jeopardize the security and privacy of data and assets across interconnected business chains. Employing a mixed-methods approach, this research paper combines quantitative data on recent cyber incidents with qualitative insights from cybersecurity experts to explore effective strategies for mitigating risks. The findings reveal a significant correlation between the implementation of advanced cybersecurity protocols and the resilience of supply chains against cyber threats. Moreover, this study underscores the importance of collaborative efforts and shared responsibility among all supply chain stakeholders in fostering a secure digital ecosystem. The implications of this research extend beyond theoretical contributions, offering practical guidelines for businesses to enhance their cybersecurity posture and safeguard their supply chains against evolving digital threats. This paper not only adds to the body of knowledge on supply chain security but also serves as a call to action for organizations to prioritize cybersecurity in their strategic planning processes, ensuring the protection and privacy of their operations in the digital age.
Downloads
References or Bibliography
Abrams, L. (2023, January 18). MailChimp discloses new breach after employees got hacked. BleepingComputer. Retrieved February 7, 2024, from https://www.bleepingcomputer.com/news/security/mailchimp-discloses-new-breach-after-employees-got-hacked/
Alder, S. (2023, September 24). Common Indicators of a Phishing Attempt. The HIPAA Journal. Retrieved February 7, 2024, from https://www.hipaajournal.com/common-indicators-of-a-phishing-attempt/
Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3. https://doi.org/10.3389/fcomp.2021.563060
Badman, A. (2023, September 20). [Spear phishing vs. phishing: what's the difference?]. IBM. Retrieved February 7, 2024, from https://www.ibm.com/blog/spear-phishing-vs-standard-phishing-attacks/
Brown, M. (n.d.). The rising risk of cybercrime in the supply chain. Supply Chain XChange. Retrieved February 7, 2024, from https://www.thescxchange.com/articles/7239-the-rising-risk-of-cybercrime-in-the-supply-chain
CISA. (2021, February 1). What is Cybersecurity? Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/news-events/news/what-cybersecurity
CISA. (2023, March 17). Virus Basics. Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/news-events/news/virus-basics
Cordey, S. (2023). Software supply chain attacks: An illustrated typological review. ETH Zurich. https://doi.org/10.3929/ETHZ-B-000584947
Drexler, O. (2023, December 24). What Is Mailchimp and How To Use It in 2024 (Beginner's Guide). Mayple. Retrieved February 7, 2024, from https://www.mayple.com/blog/what-is-mailchimp
ENISA, Cadzow, S., Giannopoulos, G., Merle, A., Storch, T., & Vishik, C. Supply Chain Integrity, 2015.
Henriksson, J. (n.d.). Cyber Supply-Chain Security Challenges in the Context of Interorganizational Collaboration. https://www.diva-portal.org/smash/get/diva2:1606249/FULLTEXT01.pdf
IBM. (n.d.). What is a data breach? IBM. Retrieved February 7, 2024, from https://www.ibm.com/topics/data-breach
Imperva. (n.d.). Phishing attacks. imperva. Retrieved February 7, 2024, from https://www.imperva.com/learn/application-security/phishing-attack-scam/
MailChimp. (2023, January 13). Information About a Recent Mailchimp Security Incident [Press release]. https://mailchimp.com/newsroom/january-2023-security-incident/
Microsoft. (n.d.). What is business email compromise (BEC)? Microsoft. Retrieved February 7, 2024, from https://www.microsoft.com/en-us/security/business/security-101/what-is-business-email-compromise-bec#footnote1
NJCCIC. (2023, January 19). NJCCIC Data Breach Notification. New Jersey Cybersecurity & Communications Integration Cell. Retrieved February 7, 2024, from https://www.cyber.nj.gov/public-data-breaches/mailchimp
Smith, G. (2024, February 16). Top Phishing Statistics for 2024: Latest Figures and Trends. StationX. Retrieved February 22, 2024, from https://www.stationx.net/phishing-statistics/
United States Department of Justice, Federal Bureau of Investigation. (2021). International Crime Report 2021. Retrieved (February 7, 2024), from (https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf )
Published
How to Cite
Issue
Section
Copyright (c) 2024 Anish Bandapelli; Dr. Sarada Prasad, Jothsna Kethar
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.