Wolftech Case

Improved Essays
The Woftech is the company their business energy sector they have many business branches in UK, central Europe and china their main office is located in Wolverhampton there are 85 employees working in their business. Their currently facing problems with IT security provision and business continuity their company using operating system such as Windows 7 and Windows XP senior staff using mobile and iPads to access to email their website is hosted by external hosting company.
Threats
The threats is human error or malicious that can be internal or external that impacts organization security this will happen in organization due poor planning, lack of policies and the lack of IT security the threats we can divide into to accidental and deliberate the
…show more content…
By doing risk assessment can identify the risk types and analyze the potential risk which can affect the organization can rank the risk medium high or low.
Based on the Wolftech case study their doing business energy sector in home and overseas they should consider the risk areas and take action to prevent currently they are facing problems areas IT security and business continuity there more some other areas might consider the areas such as
• The company should identify the risk which can happen inside the organization like internal access to the system unauthorized use because of this compromise the confidentiality
• The company should identify the external risk like the staff use remote access to access to email so should monitor because due to this system compromise and unauthorized access can happen so might risk confidential information can be

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Under the HIPAA Privacy Rule, the two important terms that need to be understood and followed properly include “use” and “disclosure”. The use of PHI involves the information to be utilized and communicated within the healthcare entity. The disclosure of PHI involves the information to be released to an individual or outside entity that follows a request. In general, HIPAA Privacy Rule protect individual’s rights to their PHI and holds covered entities accountable for providing an accounting of disclosures for PHI. With that being said, covered entities need take proper protocols on implementing the best method to track disclosures.…

    • 349 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Evaluate the risk and create policies and procedures to negate or reduce them. Educate and communicate with management and staff about risk factors. Rank risks according to likelihood of occurrences for each dept. Periodically review and update risks, and risks management programs. (Rubbens, 2007)…

    • 819 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Ibm Case

    • 334 Words
    • 2 Pages

    After the audit work, the audit officer will prepare an audit results report for endorsement by the Branch Audit Manager. Under the certain situation, the taxpayer is needed to come at the IRBM’s office for a talk on the proposed tax adjustments with the audit officer, together with at least one senior audit officer. The taxpayer, without being called by the IRBM, may come at IRBM’s office to seek the explanation about the progress of the audit process or to give more information to advance the settlement of the audit. The taxpayer will be up-to-date of the audit answers which will cover audit issues raised, reasons and rationale.…

    • 334 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Pwc Case

    • 134 Words
    • 1 Pages

    ) I found out that PwC had more than 700 internships across 29 countries of the CEE. If I want to apply for financial statement auditing next summer, do you have different requirements for the same position in different countries? Could you give me some example? 2) I see that PwC website has a separate page for alumni.…

    • 134 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Being able to get feedback from employees along with your consumer can put your corporation in an advantage. Talk with the staff, the suppliers, and every other group that is involved with your business. As a result, to being alert and visualizing all possible risk and opportunities, you are able to open new doors that can be attended to as needed. The Risk Management Approach practice involves an assessment on eight components, which are handed out to stakeholder. They take score from a scale of 1 through 10 on the corporation’s performance and level of trust.…

    • 1533 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    NHS Risk Management Essay

    • 541 Words
    • 3 Pages

    Risk management is a rapidly developing areas within many organization, whatever their nature be it public, private, or voluntary. Risk management can be defined as: “the identification, assessment, and prioritization or risks” (ISO31000, 2009) . By utilizing these various techniques, organizations can contain various risks which otherwise could result in the potential of loss or harm to the organization or members of society. In the United Kingdom, millions of people depend on the effective functioning of the National Health Service (NHS), as various procedures are carried out 24 hours a day, 365 days a year. Due to the robust nature of the NHS it is vitally important that risks are carefully managed to prevent harm to those using its services.…

    • 541 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Case Study: Techfite

    • 1218 Words
    • 5 Pages

    Techfite, well known in Britain for its “innovative recreational equipment,” prides itself in the fact that it promotes and encourages “workplace collaboration, leadership development, employee empowerment,” employee participation in corporate decisions, and its dedication toward the betterment of the surrounding community. As Techfite begins the transition from a Britain based company to a U.S. branch of that company they need to keep in mind the cultural and ethical differences between Britain and the U.S. As TechFite begins to make the move into the U.S. market and opens an new factory in Dellberg, it has become obvious to the HR department that there need to be some changes made, not only to the structuring of the workforce and community…

    • 1218 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Identifying and managing risks is a critical responsibility of project managers. Risk is defined as the probability of a specified threat and the subsequent impact that the event produces (Vaidyanathan, 2013). Risks can also bring about either positive or negative outcomes for a project or organization. A project manager must identify potential risks and evaluate each one to determine the severity and likelihood of each event. Only by completing the risk management process, a project manager can determine what approach would work best to avoid, mitigate, and/or transfer the risk.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    Given your understanding of the history and status of Cenartech,make some general observations about the firm 's security readiness. Is Cenartech at low, moderate, or high risk of a security problem? On what aspects of the description do you base your assessment? Cenartech has invested a significant amount in it’s information technology infrastructure and I would rank it moderate in risk of security problems.…

    • 884 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Furthermore, risk management is the act of forecasting and evaluating a certain situation and finding different ways to avoid and minimize the risks involved in getting the particular tasks done (Ryan, 2013). Leaders take risks, but they must first consider associated costs in order to determine if they can assume risks in a certain area and if taking those risks is advantageous. Risk management often requires careful consideration for personnel, equipment, and other resources because the goal is for individuals to achieve the most positive outcomes possible for the organization (Ryan,…

    • 970 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Risk analysis is an important element of risk management process which is been introduced in the organizations on frequent basis to have a depth analysis of risks associated with petrochemical industry or some other process industries (Tularam & Attili 2012). Risk analysis is an important aspect and have a great significance in analysis of identified risk events during risk identification or hazard identification phase of risk management. Risk analysis enables the evaluation of an identified risk event about its respective frequency of occurrence as well the potential of identified risk as what could be the severity level of the consequences caused due to that particular risk event. In addition to this risk analysis is an effective approach in order to determine the relationship between the resulting outcomes of an identified risk event and probability of occurrence of risk event (Khan et al. 1998). Furthermore, after determination of this relationship between these two concepts, it becomes possible to define the risk level of an identified risk.…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    To protect my company assets from cyber threats/attacks many things must be taken into consideration because there is always a deeper internal issue in what we believe is secure. Risk assessment and risk management are both very important parts of planning to create a safe, secure work environment to protect my employees and company both on the inside and outside of the company. I would assure that my company conducts a risk assessment periodically. This helps to see what has failed in the past versus what improvements and corrective actions have been made to present day. Comparing and contrasting the effects of failures also helps to determine if the current improvement fall into the same category.…

    • 700 Words
    • 3 Pages
    Improved Essays