International Journal of Mobile Computing and Multimedia Communications, 6(3), 75-105, July-September 2014 75 Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ABSTRACT Developing security systems to protect the storage systems are needed. The main objective of this paper is to study the security of fle storage server of an organization. Different kinds of security threats and a number of security techniques used to protect information will be examined. Thus, in this paper, an assessment plan for evaluating cyber security of local storage systems in organizations is proposed. The assessment model is based on the idea of cyber security domains and risk matrix. The proposed assessment model has been implemented on two prestigious and important organizations in the Kingdom of Bahrain. Storage systems of the assessed organizations found to have cyber security risks of different scales. This conclusion gives certainty to the fact that organizations are not capable of following the cyber security evolution and secure their storage systems from cyber security vulnerabilities and breaches. Organizations with local storage systems can improve the cyber security of their storage systems by applying certain techniques. Improving the Security of Storage Systems: Bahrain Case Study Wasan Shaker Awad, Ahlia University, Manama, Bahrain Hanin Mohammed Abdullah, University of Bahrain, Sakheer, Bahrain Keywords: Attacks, Cyber Security, Risk Assessment, Risk Matrix, Storage Systems, Threats INTRODUCTION In the old days, organizations and enterprises have had almost always a file server that is located in a corner without being used because employees were relying on their local disk drives. Nowadays everything has changed and storage systems are of high importance and of different applications and formations. Storage Systems is becoming a specialization by itself and companies acquire hardware and software storage specialists. The decision of choosing a particular storage system over another for a specific application and the way the system is managed after commissioning is not straight forward and depends on a lot of factors one of which is the cyber security which is the area of research and concern in this paper. Cyber Security of systems is becoming a major issue worldwide and it is being discussed on the highest level of decision makers. Hav- ing this said, the security of important systems which affects the performance of organizations should be assessed and improved. One of these systems is the storage system which has cur- rently a lot of breaches and vulnerabilities in most of the organizations. Some of those vul- nerabilities are the lack of access control, weak password policies and ineffective firewall rules. DOI: 10.4018/IJMCMC.2014070104