CURRENT DIRECTIONS FOR PROTECTION OF ENTERPRISE INFORMATION RESOURCES IN THE CONDITIONS OF CYBER THREATS

Authors

DOI:

https://doi.org/10.31891/dsim-2026-14(3)

Keywords:

confidentiality, information security, cyber threats, encryption, legal regulation, protection system

Abstract

The article examines current approaches and practical solutions for protecting enterprise information resources in the context of rapidly growing cyber threats. In the conditions of intensive digitalization, the use of cloud technologies, social networks, and online services significantly increases the risks of unauthorized access, data leakage, and compromise of both personal and corporate information. These threats create serious financial, reputational, and legal consequences for organizations and require the development of comprehensive cybersecurity strategies.

The study identifies the main risks associated with the loss of confidentiality of personal and official data for individuals, enterprises, and government institutions. Particular attention is given to the analysis of common sources of data leakage, including phishing websites, insecure online services, social networks, automated bots, and recruitment platforms that may unintentionally expose sensitive information. The article also reviews statistical data on cybercrime incidents and financial losses caused by breaches of information security, demonstrating the increasing scale and systemic nature of cyber threats in modern digital environments.

The legal framework regulating the protection of personal and official information is analyzed, including national legislation of Ukraine and international regulatory practices. In addition, the paper examines modern technological and organizational methods of protecting information resources, such as encryption technologies, multi-factor authentication, intrusion detection systems (IDS/IPS), Data Loss Prevention (DLP) systems, SIEM and XDR security platforms, Zero Trust architecture, and secure communication technologies such as VPN. Organizational measures are also considered, including cybersecurity policies, personnel training, security audits, incident response teams, and the implementation of international standards such as ISO/IEC 27001 and NIST recommendations.

Based on the conducted analysis, the study substantiates the necessity of implementing a comprehensive and integrated approach to information security management that combines technological tools, organizational measures, and regulatory mechanisms. Practical recommendations are proposed for improving the protection of enterprise information resources, timely detection of security violations, and increasing the overall resilience of organizations to cyber threats. The results of the research may be used in the development of cybersecurity strategies and information protection systems for enterprises operating in modern digital environments.

Published

2026-04-16

How to Cite

YAREMKO, S., DEMENTIEV, S., & NOVITSKYI, R. (2026). CURRENT DIRECTIONS FOR PROTECTION OF ENTERPRISE INFORMATION RESOURCES IN THE CONDITIONS OF CYBER THREATS. Development Service Industry Management, 2, 28-33. https://doi.org/10.31891/dsim-2026-14(3)