27 Apr 2022

364

Cyber Security in Public Companies

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 500

Pages: 1

Downloads: 0

In 2016, Yahoo disclosed that it was a victim a possibly state-sponsored cyber-attack in 2014. This breach compromised the real names, dates of birth, addresses and telephone numbers of an approximated 500 million users. This greatly affected the company’s performance and sale price in the market. According to SEC, companies are required to disclose the following information. The risk factors for potential cyberattacks, management’s discussion and analysis associated with security breaches, description of the business (how an attack would affect the company’s business aspects) and the conclusions on the effectiveness of disclosure controls and procedures. 

In the contemporary business world, cyber-attacks have become the most common security issues that face publicly traded corporations. The effects of these breaches are usually severe and they may affect the daily operations and performance of a firm. Some of the effects include the exposure of crucial investment information from a company, which may adversely affect their stocks in the market. It is imperative to note that all the shareholders of the corporation may be affected by this leakage. Consequently, the firm may lose any chances of assurance coupled with a general decline in the prices of its stocks once the trade secrets are out. A corporation should therefore conduct a cybersecurity risk assessment before disclosing any information. Apart from network security, the company should insure themselves incase such an attack occurs. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Cyberattacks directly affect the investors of a public company. In most cases, investors lose billions of shares to a company that is a victim of this security breach. In addition to this, these attacks have the potential of scaring off both existing and potential investors because they damage their stock values and expose them to the burden of incurring potential legal liabilities. As a countermeasure, it is imperative for such a firm to update its malware security program because most information in the modern world is computerized. 

The independent auditor is tasked with the responsibility of protecting potential investors and shareholders from any unrepresentative or fraudulent financial claims that are made by public corporations. The relevance of the independent auditor’s role in a firm came after the dotcom bubble and the enactment of the SOX Act in 2002. Consequently, strict reforms pertaining to the employment of independent auditors were instituted for the purpose of monitoring all auditing and accounting procedures within an organization. The Board of directors on the other hand did not have the opportunity to handle and control the internal practices of financial reporting. Consequently, this means that both parties did not exercise their responsibilities in a transparent manner as a result of a relaxed business environment where the above procedures were not adhered to. 

There is need for Koss Corporation to maintain a controlled environment for both the auditors and board of directors. This means that internal control measures must be adopted and utilized by these two parties at all times whenever they carry out their duties. Risky activities related to communication and information as well as fraud would have a less likelihood of occurring if there was no inconspicuousness. This is a very important measure because it prevents the chances of fraudulent activities from occurring. The use of these internal elements of control would have definitely eliminated any chances of embezzlement from occurring at the company. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Cyber Security in Public Companies.
https://studybounty.com/cyber-security-in-public-companies-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Texas Roadhouse: The Best Steakhouse in Town

Running Head: TEXAS ROADHOUSE 1 Texas Roadhouse Prospective analysis is often used to determine specific challenges within systems used in operating different organizations. Thereafter, the leadership of that...

Words: 282

Pages: 1

Views: 93

The Benefits of an Accounting Analysis Strategy

Running head: AT & T FINANCE ANALLYSIS 1 AT & T Financial Analysis Accounting Analysis strategy and Disclosure Quality Accounting strategy is brought about by management flexibility where they can use...

Words: 1458

Pages: 6

Views: 81

Employee Benefits: Fringe Benefits

_De Minimis Fringe Benefits _ _Why are De Minimis Fringe Benefits excluded under Internal Revenue Code section 132(a)(4)? _ De minimis fringe benefits are excluded under Internal Revenue Code section 132(a)(4)...

Words: 1748

Pages: 8

Views: 196

Standard Costs and Variance Analysis

As the business firms embark on production, the stakeholders have to plan the cost of offering the services sufficiently. Therefore, firms have to come up with a standard cost and cumulatively a budget, which they...

Words: 1103

Pages: 4

Views: 180

The Best Boat Marinas in the United Kingdom

I. Analyzing Information Needs The types of information that Molly Mackenzie Boat Marina requires in its business operations and decision making include basic customer information, information about the rates,...

Words: 627

Pages: 4

Views: 98

Spies v. United States: The Supreme Court's Landmark Ruling on Espionage

This is a case which dealt with the issue of income tax evasion. The case determined that for income tax evasion to be found to have transpired, one must willfully disregard their duty to pay tax and engage in ways...

Words: 277

Pages: 1

Views: 120

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration