As such, the company’s information technology department is concerned with the process of making sure that each of the organization’s computer systems are safe and free from any internal and external threats that may affect the operations of the business. As the company offers its services to different clients, the IT department makes sure that all operations are streamlined and that every system made to effect its operations is functional. Additionally, the department takes a center role in protecting its users from malicious attacks that could lead to different security threats being posed to the organizational product users. As such, some of the important personnel’s in the Information Technology include a number of programmers, different moderators, and system control engineers among other people who have the ability to detect any threat and any form of inappropriateness’ in the society. IT breach incident that affected Yahoo as a company There has been a number of IT security accidents that have been recorded over time and some have had very serious effects of the users of the involved sites. One of the serious IT breaches that took place in the world was that breach that affected yahoo as a leader in the provision of online related services. The breach affected a total of five hundred million user accounts as they were all reported to have been stolen by scrupulous Internet users with most of those who carry out these activities being reported to come from Russia. The breach that affected the company was termed as one of the largest single site breaches in history. Additionally, in the moth of August this year, a big number of hackers were identified trying to sell a total of two hundred million Yahoo accounts that would have affected the company greatly. After carrying out different data checks, the company confirmed that the data breach poised one of the …show more content…
In this, it is highly expected that all members of the IT team should be aware of the roles that they are supposed to take for purposes of reporting any incident that might be reported in the organization. The organizational end users should learn how to report any suspicious activities to the right personnel rather than complaining by themselves and doing nothing. As such, to instigate what has been termed as a successful disaster response plan, an initial assessment of the situation needs to be carried out, the incident should be communicated effectively, any damages done should be contained and minimized, and an identification of the type as well as the severity of the compromise made being