Captify Case Study On Networking And Security
Question
Task: Conduct a research on Captify case study, write a report discussing about the company, and tell what changes you can bring to the company to make it better as an IT adviser.
Answer
Executive Summary
The Captify case study has focused on an IT company Captify, which is the largest holder of consumer search data outside Google. The company has a unique technology that understands the intent of the consumers across a wide range of channels. This includes voice search, on-site search and in-app search. Through its intelligence and robust insights, it makes decisions for the brands across the globe. It establishes power for many popular brands such as Apple, Disney, and Adidas. The Captify case study has highlighted the existing infrastructure within the organization. The company has cloud computing platforms that provide security to its network infrastructure. It also has its systems that enable efficient transfer for large files such as CAD, spreadsheets, video and image files. Along with this, it has also maintained IT budget and security tools, which have made it convenient for the employees. There are certain issues identified in the organization in its existing infrastructure, whichis identified by the IT advisor by conducting research. On analysing the problems in the network infrastructure of the company, solutions have been illustrated within this Captify case study. This comprises of steps to be taken by the company in maintaining security for the systems and special software, which would enhance the process.
Introduction
Network and security are one of the most important parts of a business. Especially, when working over the internet, LAN no matter how big or small the business is. With a good network security system, the organization is having fewer chances of sabotage of customer’s data and its own information. Network security in a company ensures the secure transmission or sharing of data. The network security of an organization consists of various levels of security layers. The function of these layers is to break the information into various parts. It is done when transmitting the data through the help of various paths. The aim of the Captify case study is to discuss the problems faced by an IT company in maintaining network security. It will be including how those problems can be overcome with certain proposals. The company selected for this study is captify. Captify is an IT company. It is one of the largest holders in terms of search data and due to its unique understanding of different technologies. It is founded in the year 2011. Currently, the company is having 250 employees with approx 9% global market. Approx 700+ world’s famous brands are working with captify. The company understands how network hacking can put a particular business down. This particular involves the misleading of the company’s information. Damaging of the organizational intellectual property can impact network security. Once the company’s information is hacked, particularly the company’s ideas, design, and products (Bunnet al., 2017). It is not possible for the Company to develop and implement new designs and products. Therefore, it will result in the organizational revenue loss. This will destroy the business performance.
Existing infrastructure
The company examined in the Captify case study has a highly complex data and its applications are based on extracting maximum value from the searching of brands and other partners across the globe. The company aims to innovate and improve the experience of customers. Captify has semantics specialists and product teams, which successfully helps in building the future of search. The intelligence system in Captify unlocks a wide range of customer intent across the web. The intent of the customer for searching is crucial for enhancing the effectiveness of advertising. The intelligence behind driving the company is its advance Intent-based Decision technology. Information security is one of the basic technologies, which is used in Captify. Security breaches can occur due to careless employees, insufficient data storage and cybercrimes (Choshin and Ghaffari, 2017). Hence relying on such information is not appropriate. The readings used to develop Captify case study mentions that the company has implemented IT security budget and uses an open-minded approach for meeting with serious incidents. Captify has also implemented information security, which measures the regular audits, addressing security aspects and analyses the sensitivity of data. These measures have enabled the organization to protect its revenue and ensure customer loyalty. Hence, in Captifya proper data management system ensures effective information security and allows access to relevant information.
Captify gains most of its security from cloud computing as it is complicated in nature and is costly. This runs within the organization in the most efficient and traditional way. There are also appropriate security guides as well as security tools that illustrate easy compliance with security issues. The company has established a network as well as information security risks for cloud computing. An Internet connection and basic network services such as firewall, wireless access points and web server form the basic elements in this company. The company also has an Email server, which comprises of spam filtering as well as virus protection (Colemaet al. 2016). Dedicated servers for the purpose of built data centres include hot standby servers as well as automated failover mechanisms that offer an uninterruptible supply of power. The company has its own system as previously it had faced issues with the high traffic between servers as well as workstations. In this case, the business requires large files such as CAD, spreadsheets and video files. As far as physical security is concerned, there are few access points within the organisation, which increases security. Along with this, the management of business data is also stored in an authentic way.
Research on Captify case study
It is obvious that Captify is having higher chances of getting information hacked. The U.S government has said that about 70% of cyber attacks are from those businesses which are small in sizes. The reason explored in this Captify case study that the company is at higher risk is due to having less secure networks. Captify does not pay a high amount on making high quality security system. The Captify needs to follow the below steps to obtain effective network security system:
Firewall
The first layer of network security examined in the context of Captify case study is the firewall. The captify needs to install the firewall that will provide a barrier to organizational data and cybercriminals. Many companies have already started installing an internal firewall system to provide protection to its information and data.
Cyber security documents
It is compulsory for the Captify to install documents to its cyber security protocols. There is an administration for Captify providing proper training, information, and a checklist to protect its data. There is a protocol named as cyber planner that provides the first layer for security documents (a Campo et al., 2017). One of the best practices done by the company mentioned in the section of Captify case study is to install C3 voluntary program. It is having detailed information about cyber security policies and practices.
Mobile devices
Nowadays most of the businesses are working with BYOD policies. It is a document containing security precautions. It provides effective security devices through with any kind of information hacking from the outside or inside an environment that can be detected. It is also essential for employees to install automatic security updates (Shuet al., 2017). This will maintain the company policies and its application to mobile devices through accessing the network.
Anti-malware software
The employees need to know the importance of the phishing emails. It has been noticed that most of the data breach is through the phishing emails. Due to the fact that these emails directly attacks the small business network and devices (AlDairi, 2017).
Types of network securities
Access control
This refers to those users who are having access to a particular network or sections of the network. With the help of security policies, restriction on network access can be recognized to particular users. The access can be granted to guest users (Iyamuremyeand Shima, 2018).
Security application
Software in the network environment provides various ways for hackers to hack the information. Therefore, it is compulsory for the organization to update the programs daily. These will prevent the hackers to steal data. The security application is the collection of software, hardware, and practices to provide better security coverage.
Prevention of data loss
The research on Captify case study states that it is a type of technology that prevents the employees to transfer organizational information to the outside world. It provides certain actions that control the illegal uploading and downloading of organizational files (Bamigboye et al., 2017).
Impact of network securities
The importance of network securities is seen when working on the internet. High quality of networks can also be hacked but the chances are less.
Protect the client data
With the help of high-quality network security, the risk of information failing is less. It helps the organization to protect the client’s information (Mölleret al., 2017).
Protect from spyware
The organization is having effective network security will protect the systems from any physical harm. It safeguards machines from any kind of spyware or virus. Therefore, it ultimately protect from any kind of external threat. It helps the organization from any kind of physical loss.
Keep data secure
When dealing with the internet, a high network security system keeps the sharing information secure and safe. It provides various security layers at different stages of sharing information or data (Porter, 2017).
Proposed solution
Digitalization has completely transformed the way of doing business and has enabled the organisation to deliver services, which the customers as well as the employees demands. Network security helps in protecting the proprietary information from any attack and saves the reputation of the company (Iyamuremye and Shima, 2018). There are certain steps illustrated in the below segment of Captify case study that can be followed to secure the network of Captify. These include:
- Close monitoring of traffic: It is important for the company to monitor the traffic in the firewall and check for the reports. It is also important to ensure that the team of the company understands the data and can take corresponding actions.
- Staying updated with new threats: It is necessary to keep an eye on the new threats and maintain healthy relations with the security team to get email alerts. This would make individuals aware of the vulnerabilities and other exploits (Iyamuremye and Shima, 2018). It is also stated herein Captify case study that threats can also be prevented by developing a robust frontline base at the network edge. Captify must ensure free firewall as well as anti-virus software
- Provide training to training on security protocols: The Company should train employees on a routine basis and encourage a neighbourhood watch. The employee must notify if anything suspicious is found. Training must be given to the employees regarding data protection as well as additional security options.
There are wide ranges of security solution that can be recommended to Captify for creating significant changes within this Captify case study:
- Perform audit of the network: It is important for the business to perform a network audit, which would help in identifying the possible security vulnerabilities. It will also strengthen the firewall, server health, application and ensure safe backup. The result of a network security audit would provide a detailed report for reviewing with the IT administrators and their team make improvements.
- Access control: In order to keep the attackers away from the network, it is important to recognise devices and enforce appropriate security policies (Mead et al., 2017). For this, the users can block non-compliant endpoint devices and provide them with limited access, which is commonly known as NAC.
- Application security: The software on which the business operates should be protected and the presence of any vulnerability can possibly result in creating inflation for the attacker (Luká?et al. 2017). The parsec of applications security uses hardware, software and another significant professes to analyse the loopholes.
- Disable the file sharing mode and update the system with anti-Malware software: Captify in many cases purchases systems for their offices with the latest version of the software. Over time, the software is updated and in the majority of the cases, it never is updated. Hence, the findings obtained in this section of Captify case study signifies that it is important for the organization to install and update software and fix the recent bugs identified in addition to the security updates (Griffioen et al., 2019).
- Creating a network security centred environment: The Company should seek for steps that would improve the network security and thereby adopt a network security purpose. The other steps as discussed above within this Captify case study can used to educate as well as training staff regarding such protocols. Along with this, the necessity of network security should also be demonstrated to the employees.
Establishing network security maintenance team: Small firms such as Captify requires an in-house IT team, which would look after the security requirements (Bhat et al. 2016). Various network securities in the systems include performing backups, running reports, updating software and scheduling of changes in the passwords and other security measures. Depending on the size of the business, Captify should develop a team who would take the responsibility of maintaining the networking security. The main goals of this solution are to be proactive and establish a process for tracking and maintaining security in the network. The authorised access in the network can be prevented with private IP address for a specific device. The IT administrator should look after the router logs (Coleman et al., 2016).
Along with these, there are wide ranges of small-business friendly security solution discussed in the below section of Captify case study, which can easily adopted by the company. These include:
- Comodo: This is regarded as one of the most low-cost solutions for security implementation, which provides free as well as an affordable solution to the companies. Its low-cost feature does not compromise with the features as well as reliability (Min, 2018). The solution which can be implemented by the company can be Comodo one, which is a free infrastructure management platform, comprises of remote tracking and management, management of patch and service desk (Abdullah et al. 2019). The Comodo secure box helps in providing a shield to the apps from various Malware activities that enter the network. Its endpoint automatically prevents any malware and small business such a Captify can enjoy benefits such as firewall protection, device management and advanced security for POS systems.
- Social engineer: Cybersecurity initiates from the core of the organisation. A business cam implements various security measures, however, when the employee gets into the trap such as phishing cyber-attacks becomes quite easy (Teoh et al., 2018). There are several sites such as Social Engineer.com, which can significantly help Captify in identifying the risks and assessing the exploitation that can be caused due to vulnerabilities in the network. Thus, they can easily gain unauthorised access to the network infrastructure of the company (Mikkonen and Khan, 2016). Employees should receive training on social engineering risk analysis and other tests. This would significantly help in stimulating the events and mimic attacks. The presence of Social Engineer within the company offers training, as well as online training and the users, can further customize it whenever necessary.
Conclusion
From the current Captify case study, it is has been clear that network security is of utmost importance. The role of network security protects the small organization from hacking of important information. It has been seen that small businesses are the target of the hackers, due to having a less secure system. The parts or areas where the company is having fewer security systems have been evaluated. How the company will overcome the lacking areas are also discussed in the proposal. It is clear that the proposals provided above will maintain the sustainability of the company. The comodo and social engineer solutions provided for the company helped to achieve the desired organizational goal. Apart from these, various other solutions have been provided considering the scenario examined in the above sections of Captify case study to the company for gaining growth in the IT market.
Reference List
Campo, M., Dransfeld, H. and Heuer, F., 2017. The German Security Market: Searching for the Complete Peace-of-Mind Service. Captify case study In Cyber Security.Simply. Make it Happen. (pp. 59-70). Springer, Cham.
Abdullah, A., White, G.R. and Thomas, B., 2019. An Extended Stage Model for Assessing Yemeni SMEs' E-Business Adoption. In Creating Entrepreneurial Space: Talking Through Multi-Voices, Reflections on Emerging Debates (pp. 9-26). Emerald Publishing Limited.
AlDairi, A., 2017. Cyber security attacks on smart cities and associated mobile technologies. Procedia Computer Science, 109, pp.1086-1091.
Bamigboye, O.O., Olawuyi, O.F. and Tomori, R.A., 2017. Analysis of Cyber-security Benefits on Cyberspace in Nigerian Insurance Companies. Captify case study Journal of Communication, 8(2), pp.136-140.
Bhat, A.Z., Al Shuaibi, D.K. and Singh, A.V., 2016, September. Virtual private network as a service—A need for discrete cloud architecture. In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 526-532). IEEE.
Bunn, W.C., Calvert, L.K. and Karnes, M.E., International Business Machines Corp, 2017. Assessment of network perimeter security.U.S. Patent 9,749,350.
Choshin, M. and Ghaffari, A., 2017.An investigation of the impact of effective factors on the success of e-commerce in small-and medium-sized companies. Computers in Human Behavior, 66, pp.67-74.
Coleman, S., Göb, R., Manco, G., Pievatolo, A., Tort?Martorell, X. and Reis, M.S., 2016. How can SMEs benefit from big data? Challenges and a path forward. Captify case study Quality and Reliability Engineering International, 32(6), pp.2151-2164.
Griffioen, P., Weerakkody, S., Sinopoli, B., Ozel, O. and Mo, Y., 2019, June.A Tutorial on Detecting Security Attacks on Cyber-Physical Systems. Captify case study In 2019 18th European Control Conference (ECC) (pp. 979-984).IEEE.
Iyamuremye, B. and Shima, H., 2018, April.Network security testing tools for SMEs (small and medium enterprises).In 2018 IEEE International Conference on Applied System Invention (ICASI) (pp. 414-417).IEEE.
Iyamuremye, B. and Shima, H., 2018, April.Network security testing tools for SMEs (small and medium enterprises).In 2018 IEEE International Conference on Applied System Invention (ICASI) (pp. 414-417).IEEE.
Luká?, G., Sabol, T., Tomášek, M. and Furdík, K., 2017.A process-oriented service infrastructure for networked enterprises. Captify case study Electronic Commerce Research and Applications, 21, pp.1-16.
Mead, J., Vasatka, J.E. and Craig, J.A., Boeing Co, 2017. Cybersecurity system with differentiated capacity to deal with complex cyber attacks. U.S. Patent Application 14/872,698.\
Mikkonen, I. and Khan, I., 2016. Cloud computing: SME company point of view. Management Challenges in the 21st Century: Digitalization of Society, Economy and Market: Current Issues and Challenges.
Min, W., 2018, September.Application of Network and Information Security Risk Monitoring and Early Warning Platform in Electric Power Enterprises. In 2018 China International Conference on Electricity Distribution (CICED) (pp. 2718-2721). IEEE.
Möller, T., Bellin, K. and Creutzburg, R., 2017.Concept for software-based configuration of the organizational and technical security of a company of arbitrary size. Captify case study Electronic Imaging, 2017(6), pp.112-119.
Shu, F., Li, M., Chen, S., Wang, X. and Li, F., 2017, December. Captify case study Research on network security protection system based on dynamic modeling. In 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (pp. 1602-1605).IEEE.
Teoh, T.T., Chiew, G., Franco, E.J., Ng, P.C., Benjamin, M.P. and Goh, Y.J., 2018, July. Anomaly detection in cyber security attacks on networks using MLP deep learning. In 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) (pp. 1-5). Captify case study IEEE.