Reflection
In Management and Cyber Security course, I learned:
​
Touhill & Touhill (2014) recommends the following checklist to implement to best protect the victim and the organization’s interests when a cyberattack occurs:
-
Don’t panic
-
Make sure you’ve been hacked
-
Gain control
-
Reset all passwords
-
Verify and lock down all your external links
-
Update and scan
-
Assess the damage
-
Make appropriate notifications
-
Find out why it happened and who did it
-
Adjust your defenses
“In genuine listening, we put ourselves in their shoes. We tune into their wavelength. We listen from within their frame of reference, not just ours. We listen not just for what’s being said, but for what’s not being said. We listen not just to the words, but to what’s behind the words. We listen for the underlying emotions, feelings, and needs. We listen for what that person really needs or wants” (Ury, 2015)
Here are some very useful suggestions from Ury’s book, Getting to Yes:
Separate the People from the Problem
-
Negotiators are people first
-
Every negotiator has two kinds of interests: In the substance and In the relationship
-
The relationship tends to become entangled with the problem
-
Separate the relationship from the substance: deal directly with the people problem
Perception
-
Put yourself in their shoes
-
Don’t deduce their intentions from your fears
-
Don’t blame them for your problem
-
Discuss each other’s perceptions
-
Give them a stake in the outcome by making sure they participate in the process
-
Face-saving: Make your proposals consistent with their values
Emotion
-
First recognize and understand emotions, theirs and yours
-
Make emotions explicit and acknowledge them as legitimate
-
Allow the other side to let off steam
-
Don’t react to emotional outbursts
-
Use symbolic gestures
Communication
-
Listen actively and acknowledge what is being said
-
Speak to be understood
-
Speak about yourself, not about them
-
Speak for purpose
Prevention works best
-
Build a working relationship
-
Face the problem, not the people
Focus on Interests, Not Positions
-
For a wise solution reconcile interests, not positions
​
Fisher, R., & Ury, W. (1991). Getting to Yes. Penguin Books.
Touhill, G. J., & Touhill, C. J. (2014). Cybersecurity for Executives. American Institute of Chemical Engineers.
Ury, W. (2015, 1 7). The power of listening. Retrieved 12 1, 2016, from YouTube: https://www.youtube.com/watch?v=saXfavo1OQo