Preview

electronic connection risk for small business

Good Essays
Open Document
Open Document
543 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
electronic connection risk for small business
To begin with, small businesses are becoming a main focus by hackers. One main reason is small business do not believe it can happen to them because of all the big business that are out there serving a similar customer. When small businesses go electronic the main focus is not cyber security. One reason why is due to the income level of the business. Most small businesses are even taking a financial leap of faith, when going electronic connecting there business to the internet. Often times small businesses are gambling on if they have enough customers to go beyond a credit card machine let alone internet visibility, due to cost of website maintenance and website security, while keeping a store location up and running.
Jim Throneburg invented Thorlos socks in 1980 with a slogan of “Caretakers of the world’s feet”. When you think of sock companies in the 1980’s research shows the biggest company at that time was Sock Shop which had 52 stores by 1987 also equipped with internet security and monitoring and not reports of being hacked. Thorlos a smaller company was hacked due to vulnerability. Hackers had been intercepting information on the Web after a customer reported fraudulent credit card charges (Buhayar & Bunn, 2013). In my opinion smaller businesses are more likely to be hacked due to lack of proper investment in cyber security. Creating a risk of losing customers, bad press, and, ultimately in the worst case a collapsing business. Big businesses are also still at risk of being and hacked and have been hacked. “Cyber risks have gained renewed national attention after revelations about a breach of a U.S. Federal Reserve website, intrusions at the New York Times attributed to Chinese hackers and a wave of so-called denial of service attacks on the biggest U.S. banks and payment networks. Microsoft Corp. and Facebook Inc. have been targeted by malicious software” (Buhayar & Bunn, 2013).
Furthermore, aligning technology with customers’ needs is also very



References: Buhayar, N., & Bunn, E. (2013, March 20). Sock maker hack shows small-business risk chased by aig. Retrieved from http://www.bloomberg.com/news/2013-03-20/aig-among-insurers-seeking-more-sales-as-service Rang, J. (2003, September ). Are your it and strategic plans aligned. Retrieved from http://www.asaecenter.org/Resources/articledetail.cfm?ItemNumber=13514

You May Also Find These Documents Helpful

  • Good Essays

    Malicious damage occurs with most businesses, and they haven’t been easy to deal with either. There are at least 2 types of malicious that occur more often, they are worms and viruses, they both play a huge role when it comes to damaging a business…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In a recent Information Management lecture we went through the case of iPremier (read the full case) which is a popular case study from Harvard Business School. It was a made up case but the recent high profile hacking stories (such as Gawker) show that companies are not taking security seriously.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Technical department administrators can plan and put forward recommendations that might be custom-made to guarantee the Return of Investment (ROI). Business executives can go to the seminars and meetings of IT department to enhance their understanding of the specialized abilities and confinements of the organization (Rouse, 2006). “Business Alignment, the degree to which IT applications, infrastructure and organization enable and support the business strategy and processes, as well as the process to realize this.”(Sylvius et al,…

    • 1358 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Even if Congress reaches an agreement on the fiscal cliff, small business owners still face uncertainty, according to Todd McCracken, president of the National Small Business Association.…

    • 1346 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    ABC COrp assignment

    • 594 Words
    • 3 Pages

    IT Strategy: Issues and Practices by James D. McKeen & Heather A. Smith, 2nd edition of 2012.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sew What Inc. Case Study

    • 1348 Words
    • 6 Pages

    A company will not know what problems to fix or how to make the customers' experiences better if they are not aware of it. She also needs some malware security since her company relies mostly on internet-based technologies. She needs to be prepared incase her system crashes or has glitches, because information can become lost or deleted. A business can become vulnerable to individuals stealing or phishing for customer information.…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Good Essays

    References: McKeen, J. and Heather, S. (2011) IT Strategy - Issues and Practices. 2nd Edition. ISBN-10: 0132145669. Boston: Prentice Hall.…

    • 858 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Abstract Strategic Information Systems Planning has been a topic of considerable importance and interest to IS professionals in both the business and academic communities since the 1970 's. Planning is recognized as a critical competitiveness issue. Today, because information systems serve as the driver of many organizational transformations, there is increased pressure on organizations to leverage their investments in technology and information systems. Success usually occurs when an organization is able to achieve congruence between IS and organizational planning, and this is achieved when the technical and general managers of an organization work collaboratively. The strategic information systems planning process is intended to ensure that technology activities are properly aligned with the evolving needs and strategies of the organization. This paper will examine the research on this ever-important topic and suggest a process that will assist in the achievement of planning success. Introduction Over the years, many organizations have made technology decisions and acquisitions that impact organizational information systems (IS) on the basis of what they believe or recommendations from vendors or colleagues from other organizations. The end result of this approach toward decision making and expenditure of funds has been quite unpredictable. The pervasive nature of IS in today’s organizations coupled with increased pressure to leverage technology assets has dramatically increased the importance of strategic information systems planning (Bechor, Neuman, Zviran and Glezer, 2009). Today, most organizations insist that technology and ISrelated decisions be made with a clear understanding of business and organization strategy and direction. Hoque, Sambamurthy, Zmud, Trainer, and Wilson, (2005) in…

    • 4096 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    This paper will discuss strategic information systems planning, information technology, information systems, and how they affect competitive advantage, business planning, and drive change. The paper will also discuss how internal, external, and environmental factors influence strategic information systems planning and the development and use of IT and IS.…

    • 1340 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The iPremier and Denial of Service Attack case study is a made up case from the Harvard Business School. This case shows clearly how companies may not be taking their security seriously and after several high profile hacking stories, we can see that is the truth. The background of the case is that iPremier, a high end online store, suffered a DOS attack during the night. Those in charge of operations attempted to find the cause of the attack but were met with resistance from their collocation facility. Once granted access and after almost the entire company’s senior management team was involved, the attack stopped. There was no rhyme or reason as to how or why but it stopped and business was back to normal on the site.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Usn It

    • 1264 Words
    • 6 Pages

    Case Assignment 1: "How do the two UCB's strategic IT plans compare against the Baldridge criteria for assessing strategic planning?"…

    • 1264 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    IT Strategic Plan Paper

    • 4336 Words
    • 18 Pages

    The background is the first part of the IT Strategic Plan document. It is an introduction for people who are strangers to the information systems organization. These outside readers need to be given the contextual information they need to fully comprehend the IT Strategic Plan.…

    • 4336 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    Tufs

    • 1137 Words
    • 5 Pages

    References: McKeen, J. D., & Smith, H. A. (2012). It strategy issues and practices (second ed.).…

    • 1137 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Bad news is never good for any business. The moment your customers know that you have been hacked, they will try to leave you as soon as possible.…

    • 986 Words
    • 4 Pages
    Good Essays

Related Topics