Monday, June 17, 2019

Harvard Business Review Competitive Forces Paper Essay

Harvard Business Review Competitive Forces Paper - Essay ExampleHowever, the risks can be translated to a competitive advantage (Porter, 2008). Areas where IT represents a risk to guilds competitive advantage Physical threats Physical threats arise from damage of company servers and other IT resources e.g. by fire, larceny and floods. It may likewise happen as a result of unauthorized access of information by malicious employees. Electronic threats Such risks when they materialize go at compromising the information security of a company. They come in the following ways virus attacks e.g. luv exploit and Melissa viruses attach by shady hat hackers who are usually malicious and crack your IT system hoping to gain something out of the information fraudulent emails and websites. These threats can cause fraudulent transactions. The staff also misuses organizations emails and web. Organizations bandwidth can also be mis utilize by Staff who performs peer-to-peer file transfer and sh aring. Failure to update or configure the organizations software usually brings active these types of threats. Technical failure Occur when a hardware device ceases to function or some of its components get damaged. In some instances, it occurs when a software bug is introduced to the system or shows up due implementation errors. This failure can occur due to large, complex systems which are unstable and are frequently keep and updated. Infrastructural failure Occurs when network and power outages occur and one cannot access the internet. These will definitely interrupt the business process and valuable transactions might be missed out. A company may start out an Uninterrupted Power Supply, but in other cases, they seem to fail. Human error These happen when an employee fails to stick about or to be keen to IT stipulated policies and procedures or when an employee accidentally deletes important business data. Specific areas in which IT may support or promote a companys competiti ve advantage Know the IT environment/estate In order to manage risks, a company postulate to know all its IT assets. It needs to know how many servers are there, how many PCs per department, the applications running on the servers and client PCs. The company should also keep track of who uses which IT asset, who manages the assets, supports the systems, the data stored and processed in servers and machines, the work flow of the processes e.tc. A company might rate the importance of an asset by the data they store the liability which can be got when the data gets mishandled. Companies also have tools which track the assets even by the person who uses it and can even happen in real time, but the most important thing is arranging the assets in groupings which are organized e.g. as a business unit, data center product line. It can be put in any grouping which allows the analysts to do their job without too much consultation or up and down movements. A manager may want to view analysis reports or an attendee may want to view compliance reports. Identifying risks and policies The organization needs to identify the risks which are a likely and their probabilities. It should also identify the policies which can be utilize in managing risks. The starting point is identifying the operational policy controls which are usually under the companys IT Governance and risk compliance (GTC) program. The operational controls standards used

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.