Answer:
Answer is explained below.
Step-by-step explanation:
Objects on the internet are unsecured and thus securing the data and private information on the Internet is a huge task. Cyberworld poses threats when attacks happen to reveal secure and private information from individuals and companies, and also governments. Threats on the Internet are of many types and mainly considering the 2 type of threats target 2 things mainly -- money and data. So securing data is as important as securing money as data on the Internet is as valuable as money. The threats are controlled and attacked by the attackers who pose a threat to the people and do damage and data leakage from websites containing the users' personal information and other confidential and sensitive information.
Thus threats are in the Internet and in the cyber world. Cybersecurity is very important in today's world where we need to control the security of every party and protect one from attackers/hackers who steal personal information and other parties who collect personal information of the user without the user's consent. There are several risks in the cyber world on sharing personal content and using the services of the websites such as social networks and using the cloud services.
Cybersecurity risks arise on the usage of the internet and on sharing information on the Internet as it is an unsecured medium. Consequences of not taking cyber security seriously are many such as losing money and data, data leakage, hacked, infected with virus and worms. Information leakage is the biggest threat that can ever be and is the main consequence of the world in cybersecurity.
One such a case is about the California-based medical device manufacturer Inogen, where 30,000 former and current customers were exposed and compromised when only one of the employee's email was compromised. Thus, here the issue is the information leak about the personal information about the personal data of the company's current and former customers. The employee's email was accessed by some unauthorized person and files in that email have contained customer information by which it got leaked. The data of the customer which was leaked was: customer name, address, telephone/mobile number, email id, DOB, date of death, Medicare identification number, insurance policy information, and/or type of medical equipment provided. So that's a lot of personal information where we consider medical information to be one of the most private information about an individual.
Thus the company after this leak is putting in place new internal and external information security measures and operations to prevent this from happening in the future. The company is looking at all loophole in security and also insider attacks in the scenario and implementing strict security after the incident such that none happens after that.