Business Continuity

Business Continuity

  • Submitted By: excellmp3uk
  • Date Submitted: 02/12/2010 6:25 AM
  • Category: Business
  • Words: 11269
  • Page: 46
  • Views: 1

{draw:g} {draw:g} {draw:g}
Contents

Introduction
This assignment has asked us to form a group of students then to identify, analyse and evaluate any visible risks to the business continuity of the organisation and the IS and IT. Once the risks have been evaluated we then need to produce a set of countermeasures for each one to return the business to full productivity and then finally produce a disaster recovery plan for the described incident in the case study.
Potential risks
All businesses faces risks regardless of the size, nature, location or type of business, this is a fact of industry. It is impossible to foresee all the possible risks for one given business as there are too many and the main thing about disasters is they are normally unexpected. When you plan for risks/disasters it is impossible to correctly predict the impact, duration and costs to the business if it occurs.
Electrical/IT/Security
Threat 1 - viruses
Due to some data being stored on computers there is an added risk of hackers and viruses which can affect this data and possibly compromise the companies’ security and privacy. This can affect the continuity of the company because they will need this data for tests or to send the results to customers who have sent items to test.
This risk may occur due to inadequate data security on the computers which will leave the data vulnerable to attack. Also this would be a breach of laws, the data protection act 1998, that make companies’ protect all their data within their systems as a result the company can be legally viable for any data breaches which can effect continuity and cost the company a lot of money.
Threat 2 – IT developed in house
If the business software programmers were to leave “seek employment elsewhere” the business will be in trouble because there will be a problem with the support and maintenance of the new software.
Threat 3 – CCTV
Threat 4 - Reliant on one system...

Similar Essays