Cybersecurity Awareness

Securing Zambia's Business Future: Cybersecurity Guidelines for SMEs

Abstract:

This study examines cybersecurity awareness and practices in Zambian SMEs (small and medium-sized enterprises) that are vulnerable to increasing cyberattacks with significant financial impacts. Through semi-structured interviews, cross-sectional analysis, and reviews of the CISA and ENISA guidelines and Zambian Data Protection Act, insufficient training, defective policy, and reliance on basic tools have been identified as reasons for cyber insecurity. The researchers’ tailored guidelines whetted the interest of Zambian authorities. This research introduces a Cyber Awareness Framework for Zambian SMEs—emphasizing the human element in cybersecurity. Future research should encompass more SME sectors, should address outdated demographic data, and should focus on less digitized businesses.

The Cybersecurity Framework’s Most Vulnerable User: Small Business

Abstract:

The broad applicability of the National Institute for Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity, commonly known as the Cybersecurity Framework (CSF), creates a utility gap for small and medium businesses (SMB) to apply and implement the framework effectively within their organizations. The purpose of this research is to explore and interpret the CSF in the context of small and medium businesses with implications of bridging the utility gap for this significant, yet vulnerable, population; specifically, this paper contributes detailed interpretations and actions of the NIST CSF that can be implemented by SMBs to help improve their cybersecurity stance.

Big Data, Big Security, and Privacy Risks: Bridging Employee Knowledge and Actions Gap

Abstract: 

The era of big data comes with critical security and privacy risks. As a counter, technical preventative measures are being deployed but are overlooking human weaknesses. Naïve employees may debilitate the technological security barriers. Employee awareness and education is mandatory to cultivate secure actions. However, literature highlights a gap between knowledge and actions.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com