Cyber Risk Management: Data Protection Strategies and Digital Security in Business

Authors

  • Loso Judijanto IPOSS Jakarta Author
  • Olyvia Rosalia Universitas Islam Negeri Sulthan Thaha Saifuddin Jambi Author

DOI:

https://doi.org/10.62872/rsn3pe32

Keywords:

cyber risk management, digital security, data protection, cyber threats

Abstract

This study aims to analyze the implementation of cyber risk management in companies and its impact on data protection and digital security. In a rapidly evolving digital era, cyber threats have become increasingly complex, compelling companies to adopt effective policies and security systems. This research uses a quantitative approach by collecting data through questionnaires distributed to company employees who are involved in managing information security systems. The results indicate that cyber risk management has a positive impact on the level of data protection and the company’s digital security. However, the biggest challenges faced by companies include limited budgets and a lack of cybersecurity professionals. In addition, large companies in the technology and financial sectors tend to have more mature policies and systems compared to small and medium-sized enterprises (SMEs). This study recommends that companies enhance regular evaluations and internal monitoring to improve the effectiveness of their implemented digital security strategies.

Downloads

Download data is not yet available.

References

Adejumo, A., & Ogburie, C. (2025). The role of cybersecurity in safeguarding finance in a digital era. World Journal of Advanced Research and Reviews, 25.

Ahmed, S., Ahmed, I., Kamruzzaman, M., & Saha, R. (2022). Cybersecurity Challenges in IT Infrastructure and Data Management: A Comprehensive Review of Threats, Mitigation Strategies, and Future Trend. Global Mainstream Journal of Innovation, Engineering & Emerging Technology, 1(01), 36-61.

Challa, S. R., Challa, K., Lakkarasu, P., Sriram, H. K., & Adusupalli, B. (2024). Strategic Financial Growth: Strengthening Investment Management, Secure Transactions, and Risk Protection in the Digital Era. Journal of Artificial Intelligence and Big Data Disciplines, 1(1), 97-108.

Chidukwani, A., Zander, S., & Koutsakis, P. (2022). A survey on the cyber security of small-to-medium businesses: challenges, research focus and recommendations. IEEe Access, 10, 85701-85719.

Chidukwani, A., Zander, S., & Koutsakis, P. (2022). A survey on the cyber security of small-to-medium businesses: challenges, research focus and recommendations. IEEe Access, 10, 85701-85719.

Eling, M., McShane, M., & Nguyen, T. (2021). Cyber risk management: History and future research directions. Risk Management and Insurance Review, 24(1), 93-125.

Judijanto, L., Hindarto, D., & Wahjono, S. I. (2023). Edge of enterprise architecture in addressing cyber security threats and business risks. International Journal Software Engineering and Computer Science (IJSECS), 3(3), 386-396.

Kafi, M. A., & Akter, N. (2023). Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection. American Journal of Trade and Policy, 10(1), 15-26.

Lee, I. (2021). Cybersecurity: Risk management framework and investment cost analysis. Business Horizons, 64(5), 659-671.

Mishra, S. (2023). Exploring the impact of AI-based cyber security financial sector management. Applied Sciences, 13(10), 5875.

Mızrak, F. (2023). Integrating cybersecurity risk management into strategic management: a comprehensive literature review. Research Journal of Business and Management, 10(3), 98-108.

Naseer, I. (2020). Cyber Defense for Data Protection and Enhancing Cyber Security Networks for Military and Government Organizations.

Olaniyi, O. O., Omogoroye, O. O., Olaniyi, F. G., Alao, A. I., & Oladoyinbo, T. O. (2024). CyberFusion protocols: Strategic integration of enterprise risk management, ISO 27001, and mobile forensics for advanced digital security in the modern business ecosystem. Journal of Engineering Research and Reports, 26(6), 31-49.

Raul, A. C. (Ed.). (2021). The privacy, data protection and cybersecurity law review. Law Business Research Limited.

Saeed, S., Altamimi, S. A., Alkayyal, N. A., Alshehri, E., & Alabbad, D. A. (2023). Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors, 23(15), 6666.

Saeed, S., Altamimi, S. A., Alkayyal, N. A., Alshehri, E., & Alabbad, D. A. (2023). Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors, 23(15), 6666.

Sule, M. J., Zennaro, M., & Thomas, G. (2021). Cybersecurity through the lens of digital identity and data protection: issues and trends. Technology in Society, 67, 101734.

Süzen, A. A. (2020). A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem. International Journal of Computer Network and Information Security, 15(1), 1.

Süzen, A. A. (2020). A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem. International Journal of Computer Network and Information Security, 15(1), 1.

Wylde, V., Rawindaran, N., Lawrence, J., Balasubramanian, R., Prakash, E., Jayal, A., ... & Platts, J. (2022). Cybersecurity, data privacy and blockchain: A review. SN computer science, 3(2), 127.

Downloads

Published

2025-04-30

How to Cite

Cyber Risk Management: Data Protection Strategies and Digital Security in Business. (2025). Maneggio, 2(2), 195-204. https://doi.org/10.62872/rsn3pe32

Similar Articles

121-130 of 146

You may also start an advanced similarity search for this article.