Senwes Case Study

Great Essays
Risks identified by Senwes: These are the major risks that have been identified by

Senwes:

• Increase in pricing by their funders

• Farmers purchase direct from suppliers - prices are cheaper and it is more

comfortable

• Competition from banks - rates are a problem

• Uncompetitive product offering by Hinterland

• Land reform and intervention by Government- missing opportunity

• Loyalty scheme – Senwes don’t have one while competitors have one in place

Risks identified by Silverstone Limited: These are additional risks that have been

identified by Silverstone Limited:

External risks

• The buying of the NWK debt book - Risk that their debt policies differ from that

of Senwes. There is a risk that NWK might lose clients, which
…show more content…
Should the components be exposed to too much

heat and humidity, it can lead to the malfunctioning of the components, and

effective loss of integral data.

• Risk of theft of crucial components from the IT data centre, which will lead to

the loss of data, as well as potential unauthorised access to the data of the

credit department, depending on the type of component.

• Risk of no disaster recovery plan being in place in case of the event of a

disaster, which can lead to the loss of integral data relevant to the company

as a whole, including the credit department, which can even lead to

consequences as severe as the demise of the company.

• Risk of the disaster recovery plan not being widely available in case of a

disaster, as time might be crucial, and the plan might not be effective enough

should it not is implemented with immediate effect.

• Risk that no backups exist regarding crucial data regarding the IT department,

or that backups aren’t made of a timely basis, as crucial data relevant to the

credit department might be lost in case of the loss or corruption of
…show more content…
• Ensure sufficient temperature control in the IT control room, in order to protect

electronic components from heat and humidity.

• Ensure that a sufficient backup recovery plan is in place, and readily available

in case of emergencies.

• Copies of the disaster recovery plan should be kept on another premises as

well

• Copies of backup data should be kept on another premise than the IT data

centre in order to avoid destruction of backups, in case of emergencies.

• Ensure that sufficient anti-virus applications are installed on all computers, as

well as the servers, in order to prevent any unauthorised access to the system

by third parties.

Response to risks with regard to the usage of SAP

• Proper reviewing of all data entered into the system, in order to ensure that all

data has been processed correctly

• Proper review of all submissions to SAP, in order to confirm that all

submissions are complete.

• Ensure that all employees are properly trained in order to understand SAP

and all it’s functions

Senwes’ risk management strategies

Response to external risks

A pre-requirement of getting financa from Senwes Credit, is to have sufficient

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Many of these concerns may be remedied by simply revisiting the company policies and procedures. Data loss is a serious problem. Typically large companies have an automatic data backup in place. Proper automatic backups can be set up daily, weekly, or monthly. For this size company, I would recommend daily backups.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    1 Camila Rejalaga Sept 24,2017 Earth 101 Volcano Project 2. What we learned from Mount Saint Helens: Surprises and New Science from the Eruption (Brochure) Welcome to Mt. Saint Helens Park Visitor Center! To better understand Mt. Saint Helens we must first go back to 1980. Although some of you might not have been born yet it was in that year that the US experienced its most destructive volcanic eruption in its history.…

    • 1072 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    For instance loss of time in a business can cause major issues like money loss and also the frustration for customers and staff. The problems that can cause the loss of time can be like power cuts, floods, fires or a user infecting the network by putting in a USB which can be potentially infected from their home computers. To stop this happening in a short time you should have some emergency generators, data backups this is a good plan when the system is offline. Business information loss: If a business has an unsecured network, other big companies can use that time to see any of the records for that business. There are some programs online which allow you to access any important information such as account names, usernames, password and many more on an unsecured wireless network.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    INFO 290: Final Exam

    • 1200 Words
    • 5 Pages

    INFO 290 – Final Exam Name (Print) Cristian David Ramirez-Loaiza Signature______________ Date:____________ Answer any FOUR questions 1. Explain in detail with examples as to why a business needs a disaster recovery plan and Business Continuity plan?…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Week two of our material provided us with several different elements of the homeland security assessment process. What I gathered most from the material was based on the “Baldrige Assessment Criteria and the eight step process for a successful assessment” (Fisher, 2004). However, the consensus is that the key elements in the homeland security assessment process are “a threat assessment, a vulnerability assessment and a criticality assessment” (Decker, 2001). In my opinion, these three key elements are equally critical components of any emergency management plan and/or emergency management service. Virtually every day we hear of heightened degrees of already proposed threats or new means of threats to our nation, as well as the criticality of them.…

    • 626 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The wind howls, the bullets of rain shoot down, and the sun hides behind thick daunting clouds as Hurricane Katrina ransacks the vibrant southern coast of the United States. States including Florida, Georgia, Alabama, Louisiana, and many more surrounding were then thrown into a war against nature. On August 29, 2005, $118 million cubic yards were destroyed and over $110 billion dollars in damage were left in Katrina’s path of destruction. On that day, 1,836 lives were taken and millions more were ruined (Amadeo 1). Ten years later after the devastating hurricane seemed like a forgotten nightmare, the Carolinas faced severe flooding inducing 25 deaths and over $1 billion dollars worth of damage (Collins 1).…

    • 2180 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Incident Command System

    • 614 Words
    • 3 Pages

    One of the classes from college I need to take some classes from Incident Command System. However, this week's readings are more in depth and newer information to me. The video about Incident Command System helped me to learn more about the roles in the system. From the video, it shows how different positions from Incident Command System take parts in an emergency. What new information you gathered from this week's PPTs, videos, articles, and assigned reading Due to the lack of emergency service field, the assigned readings about Scene Control and Planning system are fascinating to me.…

    • 614 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Suppose your computer system was ruined or damaged by a simple power surge. Imagine your business needed to be shut down temporarily because an electrical surge damaged all your equipment. What could happen to your business if an employee error damaged your only production machine? Even broken water pipes can cause a lot of damage. You may not expect them, but any of these things could happen.…

    • 655 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Bio-Terrorism Among Nurses

    • 1794 Words
    • 8 Pages

    “All nurses please report to the main nurses’ station”. The nurse supervisor starts telling us that there has been a release of a bio terror agent in the air system and we need to be ready to receive a large influx of patients. What was the agent released? Are we safe here? Will the patients be contagious?…

    • 1794 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    The era of the Cold War introduced a common practice of risk preparedness through the civil defense model as result of the threat of a nuclear attack from the Soviet Union (Haddow, Bullock, & Coppola, 2014). Although, emergency management in the sense we know today was not fully existent during the cold war, but the principles that that civil defense model was established has carried into modern day. Certain measures were set in place such as identification of bomb shelters to protect individuals and families (Haddow, et al, 2014). Today, similar practices remain in place regarding preparedness, emergency managers identify shelters within a community for residents to occupy during emergencies, storms and power outages. The civil defense…

    • 282 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In healthcare, it is essential on how the coordination of how services are being delivered. Collaboration is necessary. Team collaboration plays a very important part when coordinating services as it essential that everyone stays on the same page. Effective communication is very important, having a lack of communication can cause unnecessary issues such as the risk of patient safety. Some level of collaboration is required between health care providers because it is necessary as a lack of communication can creates issues (O’Daniel & Rosenstein, 2008).…

    • 1049 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The basic protection of data depends on update the anti-malware protection, firewall, and encryption. Creating some security awareness programs. All the people should maintain the data confidentiality and data integrity. In each organization…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    This can be one of the hardest steps because it can be difficult thinking about vulnerabilities the system might have. Today’s technology is advancing at a rapid rate, which makes it difficult to keep up with the new threats, viruses, and vulnerabilities that come with it. A few examples for Wells Fargo can be; poorly trained employees, disgruntle employee, power outage, breach on the servers, misconfigurations, natural disasters, and many others. If someone where able to breach any server, irreparable damage could be caused as well as confidential information stolen. A poorly trained employee could be one of the biggest risk imaginable.…

    • 720 Words
    • 3 Pages
    Decent Essays