Preview

electronic connection risk for small business

Good Essays
Open Document
Open Document
543 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
electronic connection risk for small business
To begin with, small businesses are becoming a main focus by hackers. One main reason is small business do not believe it can happen to them because of all the big business that are out there serving a similar customer. When small businesses go electronic the main focus is not cyber security. One reason why is due to the income level of the business. Most small businesses are even taking a financial leap of faith, when going electronic connecting there business to the internet. Often times small businesses are gambling on if they have enough customers to go beyond a credit card machine let alone internet visibility, due to cost of website maintenance and website security, while keeping a store location up and running.
Jim Throneburg invented Thorlos socks in 1980 with a slogan of “Caretakers of the world’s feet”. When you think of sock companies in the 1980’s research shows the biggest company at that time was Sock Shop which had 52 stores by 1987 also equipped with internet security and monitoring and not reports of being hacked. Thorlos a smaller company was hacked due to vulnerability. Hackers had been intercepting information on the Web after a customer reported fraudulent credit card charges (Buhayar & Bunn, 2013). In my opinion smaller businesses are more likely to be hacked due to lack of proper investment in cyber security. Creating a risk of losing customers, bad press, and, ultimately in the worst case a collapsing business. Big businesses are also still at risk of being and hacked and have been hacked. “Cyber risks have gained renewed national attention after revelations about a breach of a U.S. Federal Reserve website, intrusions at the New York Times attributed to Chinese hackers and a wave of so-called denial of service attacks on the biggest U.S. banks and payment networks. Microsoft Corp. and Facebook Inc. have been targeted by malicious software” (Buhayar & Bunn, 2013).
Furthermore, aligning technology with customers’ needs is also very



References: Buhayar, N., & Bunn, E. (2013, March 20). Sock maker hack shows small-business risk chased by aig. Retrieved from http://www.bloomberg.com/news/2013-03-20/aig-among-insurers-seeking-more-sales-as-service Rang, J. (2003, September ). Are your it and strategic plans aligned. Retrieved from http://www.asaecenter.org/Resources/articledetail.cfm?ItemNumber=13514

You May Also Find These Documents Helpful

  • Good Essays

    That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    References: Haydamack , C. D. (n.d.). strategic planning processes for information technology . Retrieved from http://r.search.yahoo.com/_ylt=A0LEVzGVpbRUzT0AzCNXNyoA;_ylu=X3oDMTEzNHByYWQ5BHNlYwNzcgRwb3MDMQRjb2xvA2JmMQR2dGlkA1ZJUDI4MV8x/RV=2/RE=1421153814/RO=10/RU=http://www.bptrends.com/publicationfiles/09-08-ART-StrategicPlanningProcess-Haydamack.doc-final.pdf/RK=0/RS=QIcjMuFjMZCU8QuTJzl0VRF_amI-…

    • 2699 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Lay out the specific business drivers, assumptions and plans that informed the IT strategic plan. (For example, the business is planning to acquire smaller companies so its plan is to focus on integration technologies.).…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    While the effects of one of these attacks is realized at a much higher price for larger businesses, smaller companies are actually targeted more often because of their lack of security infrastructures and data monitoring systems. In fact Horton claims that more than 90% of data breaches affect small businesses. (Horton, 2014) These startling numbers leave many small business owners wondering what they can do to reduce the risk associated with cyber-attacks.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    Threats |Confidentiality |Integrity |Availability | |Denial of Service Attack |Low |Medium |High | |Power Supply Failure |Low |Low |High | |Malicious Code Infection |High |High |High | |Theft and Fraud |High |Medium |High | |Website Intrusion |High |High |High | |Unauthorized Data Access |High |High |Low | |The small business and companies should address and take care of the security holes and threats, and it should not be necessarily a complicated and costly process. The small business and companies need to have information security, for the following reasons:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In a recent Information Management lecture we went through the case of iPremier (read the full case) which is a popular case study from Harvard Business School. It was a made up case but the recent high profile hacking stories (such as Gawker) show that companies are not taking security seriously.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The iPremier and Denial of Service Attack case study is a made up case from the Harvard Business School. This case shows clearly how companies may not be taking their security seriously and after several high profile hacking stories, we can see that is the truth. The background of the case is that iPremier, a high end online store, suffered a DOS attack during the night. Those in charge of operations attempted to find the cause of the attack but were met with resistance from their collocation facility. Once granted access and after almost the entire company’s senior management team was involved, the attack stopped. There was no rhyme or reason as to how or why but it stopped and business was back to normal on the site.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This paper will examine the current and future use of internet technologies that Boohoo.com undertakes. ‘The company’s mission is to provide a visually stimulating, invigorating and evolving on-line shopping experience, which offers inspirational products, exciting promotions and unsurpassed customer service.’ (Boohoo, 2010)…

    • 5653 Words
    • 23 Pages
    Good Essays
  • Best Essays

    Wal-Mart Location Study

    • 2011 Words
    • 9 Pages

    While there are some that view Wal-Mart as a threat to small businesses, there are some small businesses that believe they…

    • 2011 Words
    • 9 Pages
    Best Essays
  • Better Essays

    Usn It

    • 1264 Words
    • 6 Pages

    Case Assignment 1: "How do the two UCB's strategic IT plans compare against the Baldridge criteria for assessing strategic planning?"…

    • 1264 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Best Practise

    • 8154 Words
    • 33 Pages

    3.2. Strategy ....................................................................................................................... 9 3.3. Strategic Management ............................................................................................... 10 3.4. IT Strategic Planning.................................................................................................. 11 4. IT Strategic Management Process…

    • 8154 Words
    • 33 Pages
    Powerful Essays
  • Satisfactory Essays

    Even if Congress reaches an agreement on the fiscal cliff, small business owners still face uncertainty, according to Todd McCracken, president of the National Small Business Association.…

    • 1346 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Strategic information systems planning is a crucial component of business in the 21st century. From the smallest of businesses to multi-national corporations, successful use of IT and IS drive fundamental business processes, help business cope with increasing marketplace demands, and form an integral basis for competitive advantage.…

    • 1340 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Sew What Inc. Case Study

    • 1348 Words
    • 6 Pages

    A company will not know what problems to fix or how to make the customers' experiences better if they are not aware of it. She also needs some malware security since her company relies mostly on internet-based technologies. She needs to be prepared incase her system crashes or has glitches, because information can become lost or deleted. A business can become vulnerable to individuals stealing or phishing for customer information.…

    • 1348 Words
    • 6 Pages
    Good Essays

Related Topics