The Assessment of risk factors that may attribute to the occurrence of unwarranted actions presents some challenges to security officers. My selected organization is International Business Machines Corporation (IBM) that deals with the production and sale of computer hardware and software. Security official at IBM engages in an intensive process of determining the risks associated with information, natural, human-made and technological threats. This ensures that the organization make formidable plans to counteract these threats. Uncontrolled threats or lack of good plans exposes an organization to losses of data and critical information that may be used by competitors to their advantage. There are many methods that an organization can use in the determination of risk. However, it must ensure that the method applied align to the goals and vision of the company. Therefore, the essay discusses how security officials at IBM determine vulnerabilities to natural, human-made, and technological threats.
In this section, the essay expounds on vulnerabilities affiliated to different risks such as technology and natural threats. In addition, different methods will be discussed into details to ascertain the best alternative Vulnerability plan to be utilized by an information and technology organization. Vulnerabilities can be defined as an occasion/situation that exposes an organization/ individual to loss or danger. This means that an individual is more likely to incur losses if proper measures are not put into place to reduce the risk exposure.
Information, Technological, Natural and Human- Made Threats
First, information is an important tool for an IT business. The information systems prevalent in the organization are not free from leakages. Hackers may get critical information that they will use for their own benefits. Some employees may engage in uncouth behaviors by trading critical data with the organization competitors in returns for financial benefits. These actions put the organization at a disadvantaged state because their rivals will implement destructive strategies that will see the organization lose its market share. To determine whether the organization is losing its secretive data to unauthorized persons, the security personnel’s will install firewalls and security features on various websites to help monitor employees activities (White, 2014). By doing this, the organization will be in a position to block some of the loopholes. Technological threat on the other hand denotes the Introduction of new systems for data storage and communication purposes. The International business machines applies cloud computing in sharing data as well as in the communication between different departments. It lowers the cost of administration as well as maintenance of expensive systems that were previously used by the firm. However, this system is susceptible to hacking and misuse by people entrusted to oversee its operation (White, 2014).
The plan is as follows:
Figure1: The figure above represents risk assessment.
From the figure above, vulnerability assessment takes a process. This process involves planning, evaluating, making decision and taking the necessary steps.
Therefore, establishing the loopholes requires that the organization/management come up with policies that guide users while applying internet. This insinuates that users will behave and act in a responsible manner. Human made- made treats emanates from the manner in which employees behave in regards to information resources. Therefore, the code of conduct needs to be stringent enough to discourage unethical behaviors by employees. In addition, negligence also contributes a lot to data loss or leakages. Disciplinary measures should be introduced and strengthened to discourage irresponsibility amongst employees. Natural threats come from the environment where the organization is operating in or the threats affiliated to a particular business. Businesses dealing with information systems and technology are more likely to suffer attacks by hackers than any other type of business.
Personnel and Work Behaviors
Work ethic is an aspect of organizational success when put into the right use. IBM cannot afford to lose money or revenues through unwarranted behavioral attributes by its workers. This type of treat can be detected through signs such as misusing the company resources, engaging in shoddy deals and reduction in productivity levels. These activities deny the organization its precious time and resources that could otherwise have been utilized productively. In an effort to curb the menace, the organization should develop a well structured plan and schedule that outlines employee’s duties. Those employees who do not follow the set rules will have to be punished through various disciplinary measures developed by the entity.
Transportation presents the biggest challenges for the multinational corporation. This is because some goods on transits have fallen into the wrong hands such as bandits and thieves. This prompted the organization to earmark some of the regions in the world as hostile. The reason behind this is that several cases of robbery have been registered in these places. To an extreme end, IBM has decided to withdraw its operations from a country such as India. The move affects the firm and its brands sold all over the world. In addition, the natural weathers causes delay during transportation in undeveloped areas. Furthermore, breakages of hardware goods may take place an action that results to losses for the entity.
Socio-Economic and Criminal Activity Factors
Social-economic factors are concerned with the branding, selling and marketing of computers products. A lot of funds are used in promoting the brands in the market. Some communities have not embraced the new way of life where computers and technology forms the norms and are applied on daily basis. Therefore, selling or marketing technological devices to such a community is a waste of time and resource. The same situation has ever happened to IBM and it had to withdraw its services in some markets for lack of potential clients. Detecting these activities goes hand in hand with the carrying out of market research (Derr, 2016).
Moreover, highly developed markets are hard to penetrate especially when marketing a new brand of products. However, IBM has been able to overcome this challenges due to its many years in operation in providing services for both hardware and software devices. Rival companies have intensified their marketing techniques/strategies to gain market-leadership. IBM on its side has not been doing well in this area an action that puts its services in jeopardy. It has lost a good percentage of its market share to other companies who engage in customer focused services when offering designated services.
Criminal activities are unpreventable if they emanate from the external environment. However, IBM has introduced some strategies such as installation of security systems to monitor people movements in and out of their premises. This facilitates their monitoring and supervision activities hence reduce crime by a great deal. Crime is not only a problem to businesses but also to the government which looses income inform of revenues when firms ceases to function. Loosing property to burglary forces the organization to reschedule its operation and manufacturing procedures to cater for the change of events. Crime is also reduced through employees training endeavor. It makes sure that they perform their duties using the right procedure.
Venerability associated to the presence of substitute goods includes lowered prices of goods produced, competition for resources and increased cost of operation. Businesses scramble for the scarce resources so as to maximize on profits. This leaves many organizations at a crossroad unable to find the best alternative action to undertake. Companies located within a particular region compete for labor forces. Due to the rising demand for workers, labor becomes an expensive aspect of production. Some organizations entice competitor’s employees with money and good salaries so as to resign. They will then employ them and use their knowledge about their neighbors/rivals to launch programs that will see competition move to a higher level.
In conclusion, IBM has served in the technology business for over fifty years. These years have been a learning journey for the organization in terms of market demand and supply. The taste and preferences for electronic products is dynamic and changes from time to time. This means that the company has to come up with new ways of doing things or new brands to maintain its market share. To be able to do this, venerability assessment is carried out for each risk. It helps ascertain the extent to which risk can affect an organization or halt its operations. Therefore, engaging in risk assessment is not an option for a technological firm. This is because of the nature of business and the environment to which the company operates. IBM has faced competition from companies such as Microsoft and Apple. However, its hardware products still dominate the market especially for the middle income earners.
Derr, R. (2016). Vulnerabilities. Threat Assessment and Risk Analysis, 12(4),
White, J. M. (2014). Workplace Violence Risks and Vulnerabilities. Security Risk Assessment,22(3),