Author:
Kafi Md Abdullahel,Akter Nazma
Abstract
Securing financial information, especially accounting, is essential in the digital world. This article explores organizations' challenges in protecting accounting data from evolving cyber threats. By sharing real-life case studies and industry research, we offer suggestions to enhance the security of accounting information. These recommendations include adopting cybersecurity frameworks implementing technical defenses like endpoint protection and network segmentation, following secure coding practices prioritizing user awareness and training, creating incident response and business continuity plans, regularly conducting vulnerability assessments and monitoring, maintaining strong vendor relationships, and ensuring compliance with relevant regulations and standards. By implementing these suggestions, accounting professionals and organizations can strengthen cybersecurity measures. Effectively protect valuable financial data from the ever-growing threat landscape. Taking an approach that combines technical measures, user awareness, incident preparedness, and regulatory compliance is crucial when navigating the digital landscape with confidence and resilience.
Reference43 articles.
1. APWG. (2022). Phishing Activity Trends Report. https://apwg.org/trendsreports/
2. BBC News. (2016). Bangladesh bank hackers fail in bid to net $1bn. https://www.bbc.co.uk/news/technology-35773061
3. Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2019). Voice Recognition Systems in the Cloud Networks: Has It Reached Its Full Potential?. Asian Journal of Applied Science and Engineering, 8(1), 51–60. https://doi.org/10.18034/ajase.v8i1.12
4. Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2021). Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing. American Journal of Trade and Policy, 8(3), 231–238. https://doi.org/10.18034/ajtp.v8i3.651
5. Bukth, T., & Huda, S. S. (2017). The soft threat: The story of the Bangladesh bank reserve heist. SAGE Publications. https://doi.org/10.4135/9781526411228
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献