Peer Review of the attached (Importance of Cybersecurity Today)
For your response post, do the following:
Select one post made by another student to evaluate (Attached). Try to find a student who has not had any feedback. Reply to one classmate outside of your own initial post thread.
For this module, complete your one response..
Read through your peer’s post carefully, and then address the following prompts:
– State your peer’s argument about the persuasive topic.
– How can your peer address the challenges that were identified about convincing your peer’s audience?
– Offer one research or writing suggestion to help meet your peer’s identified goal.
– What evidence would convince you as a reader?

Importance of Cybersecurity Today
The first persuasive argument will be why cybersecurity is an essential part of internet safety today. As stated in my annotated bibliography, Arizona Gov. Doug Ducey said it best by saying that cybersecurity is homeland security”. Multiple government agencies work hand in hand to protect our homeland and our protected information from hackers from all over the world. From mobile devices, to wearable devices, computers, and every device able to connect to the internet can be at risk.
The audience remains the same as previously submitted assignments, that users of mobile devices need to be more educated on the important of cybersecurity. As Forbes recently noted, phishing is still the main method of hackers to get our valuable information. Phishing is as easy as the hacker sending a real looking email from your bank, your friends or even a government agency. In 2022, half of mobile device users were exposed to phishing. Challenges with cybersecurity today, is the ever changing atmosphere. Michael Geraghty, New Jersey’s Director of cybersecurity once said, “You better have roller skates on to keep up with everything that’s happening,” The goal would be to be able to stay two steps in front of the changing technology and be one step ahead of the hackers to help protect businesses, government municipalities, and everyday people to name a few.
A key point for cybersecurity importance today is approximately 30,000 websites are being cyber attacked every day. Understanding what websites we go on and what personal information we enter will help, but also understanding it opens our computer and what we have saved on it could be prone to an attack. Keeping our computers and mobile devices safe will help us in the future of keeping vital information in a secure location. Being able to adapt to the ever changing ecosystem of the internet would help us stay ahead of the potential attack.
Another key point will be cybercrime could be detrimental to a large corporation with an average cost of over $4 billion dollars.[1] A data breech could lead to long term effects like financial issues, legal liability, identity left, and reputation damage to list a few. With ever changing cloud systems, it’s hard for corporations to keep up with the evolving ways hackers learn to bypass security measures. It may be expensive to keep their system, but it far outweighs the negative effects. As stated in the first key point, being able to adapt and change at a moments notice would help us be ready and ahead of the game.
While both topics have major impacts on not only employers, but our everyday lives. I would have to say that mobile devices have become the major security risk in our everyday lives. Personally, my smartphone goes everywhere with me. I can log onto school work, look at my banking apps, looking at social media, and simply just playing games. So much is saved on my smartphone that any data breach would be significant for me. Many Americans, like myself, from all ages have a mobile device and most likely don’t know which applications are more secure then others. Just opening a message on Facebook that looks like it’s from a friend could be a potential hacker. By becoming more informed as a society and making each application more secure, will help keep hackers at bay and our data safe.

Sample Solution

Sample Solution

This question has been answered.

Get Answer