Assessment Description: A company profile helps to convey a business' value proposition to customers and identifies the services and products the company offers. A company profile is a window into the

13









Business Continuity Plan







Executive Overview

With the development and new trends in the market, financial institutions are likely to face risks resulting from cyber-attacks, software failure, terrorist attacks, hardware failure, computer failure, and natural disasters, among other problems. It is essential to develop a business continuity plan that can be relevant in addressing possible risks and how the business can recover in case of a cyber-attack.

In case of risks such as a terrorist attack or disaster within the financial institution's location, the institution is likely to suffer direct impacts. This is because the organization will suffer direct and indirect expenses such as renovating the damaged property, and the institution might suffer losses in revenue due to reputation, depending on the type of attack. This report aims to develop an effective business continuity plan that might minimize risks to a financial institution despite a disaster. (Kumar, 2020)

Document change control

For changes to be implemented in an organization, they have to be discussed using a predetermined procedure that captures the primary considerations of the change. Some of the activities that might occur in an organization and lead to change include upgrading systems in the infrastructure and increasing employee wages, among other activities. When changes are to be made in the organization, it is always essential to discuss the proposed changes before implementation to ensure that all the team members are aware of them. Furthermore, discussion of the changes helps ensure the institution's operations are not disrupted, which might waste the time and resources of the organization.

The chart below illustrates documentation of a change and steps that were taken to implement the change.

Project: upgrading information systems

Client: Mervin INC.

Project manager: Jeffery Patel

Change ID

Date

Change Description

Authorization

Changes and Effects

Permission

Date

Time

Cost

EQ 31894

17/07/2021

Installing new information technology devices that will enhance security

Yes

25/07/2021

One month

$87,000








Well-executed change control has several benefits to an organization. One of the main benefits is that it allows the workers to control themselves psychologically, thus allowing them to meet the plan's demands. The second benefit of a well-executed plan is that it allows the resources to be equally distributed, which is crucial in the operations of the financial institution, thus making the operations of the business keep running smoothly. (Stein, 2018)

With an effective change plan, it is possible to enhance the teamwork process. This is because for an effective change to occur, all the team members must collaborate, which will likely lead to enhanced efficiency as all activities will be carried out in the specified amount of time stated by the change to be made. If the team members can adapt to a change on time, the company's productivity is likely to increase, thus allowing the company to meet its demands. Below is an outline for an effective change process.

  1. Change Proposal - Change identification is the first step toward making the change, and it should mainly come from a member inside the institution. After a person identifies the area to make changes, relevant communication channels should be used to allow the message to reach the required stakeholders. Change benefits can be documented at this stage.

  2. Impact summary – In this stage, the project manager analyzes the larger context of the change's impact. Some variables analyzed include resources to be deployed, employees, additional costs, and the risks that might be encountered. After the manager has analyzed the change, he can accept or decline the change that has been proposed.

  3. Decision making – After the manager has fully assessed and approved the change, the manager has to discuss the change with the board of directors, depending on the organization. The board of management can schedule to discuss the change for them to make more evaluation on the impacts of the change.

  4. Implementing the change – if the change has been accepted, it moves directly to the planning stage, where effective action can be developed. Implementation might include the start date to the end date to monitor the results of the change. If there are inconsistencies associated with the change, the management team can move to the previous regression. On the other hand, if the change is successful, it can be documented in the organization's operations.

  5. Closure – This is the final phase of the implementation as it involves wrapping up operations associated with the change. Presentations of the outcome may be documented at this stage and the people involved in implementing change. If all the organization members agree with the change, the change documentation can be signed to be used for the company's future.


Introduction

Overview

Mervin INC. is a financial institution that mainly provides loans to customers who are required to pay back at a particular interest for a particular time. Apart from offering loans, the company offers investors an investment opportunity and banking services where they can invest. According to the company's policies, the minimum investment amount is $1000, and interest will emerge after six months at least 18 years of age. The policies have attracted more users, thus allowing the company to expand to other geographical locations.

Scope of plan

Despite the company developing effective strategies to prevent cyber threats and disasters, the business needs to develop an effective business continuity plan. Without an effective continuity plan, the company can undergo risks that might be hard to recover from, leading to the organization's failure. After a detailed assessment of risks that might impact the business, the company developed a detailed risk assessment which covered disruption of power supply to the company, equipment failure, application failure, human error and sabotage, cyber-attacks, natural disasters like earthquakes, and also malware attacks to the systems. (Mbiru et al.., 2020)

Applicability

Since the company has been developed recently, it has not covered most parts of the nation; thus, it has allowed customers to register via its online platforms, where they can get services they might need depending on their credit records. Despite customers from various geographical locations accessing the organization's services through its platform, the cyber security teams of the company have put into place various measures to ensure that the company and its customers are protected to prevent cyber-attacks.

  1. Firewall - This feature has been installed in the company's information systems and will be used to filter the ongoing and outgoing traffic based on the users' predefined policies. This feature will monitor the users' activities and warn them about their sensitive information to enhance security from and to the network.

  2. Access control – this feature will be used to define privileges for the users who use the computers depending on their roles in the organization. Company employees will have different rights compared to the customers, thus allowing them to carry out their tasks efficiently. This feature will ensure that the employees are not provided with unnecessary rights that might compromise the organization's security.

  3. Encryption – This feature has been implemented as end-to-end encryption, ensuring that data is not leaked to unauthorized parties who might try getting it using man-in-the-middle attacks. With encryption, the company's security will be prioritized, thus ensuring the safety of the company and its employees.

  4. Physical security measures – The Company has installed a perimeter wall with an electric fence to keep unauthorized parties from getting to the organization. Furthermore, guards at the company's main entrances are equipped with metal detectors to ensure no one enters the premises using an assault instrument, and the storage devices will be effectively evaluated upon getting to the premises.

  5. Cloud storage – The Company has opted to cloud storage to ensure that the required information is provided to whoever needs it at any particular time, depending on the user's rights. This helps the company's customers access the organization at any given time and access the services they would like, leaving them with a smooth experience. The company also uses cloud storage to create backups if an organization's cyber-attack occurs.


Risk Assessment Matrix

Risk

The risk likely to be experienced in the financial institution is a risk associated with a data breach where personal information such as passwords and usernames are stolen, making accounts compromised. If a breach occurred, sensitive information would be accessed without authority from stakeholders of the company.

Likelihood

This cyber threat is likely because many cyber criminals are looking to steal credit card information and conduct unauthorized transactions with the cards.

Severity.

The severity of such a data breach is high as the cybercriminals might have access to private information such as the customer's Social Security Number, which would never be changed. This would put the intruder's life at risk at all times of getting compromised.

Impact

The impact of most data breaches is very significant. This is because intruders would rob a customer by breaking into his bank account do unauthorized transactions leaving the bank to cover for the risks caused.

Cost

A significant data breach will likely cost as customers' confidential and sensitive information can be stolen, damaging the company's reputation. Customer prosecutions might cost a data breach up to cost up to $1,000,000 or more, depending on the impact.

Risk Assessment Matrix:

Using a risk analysis matrix, identify where on a 3x3 risk diagram the risk would fall.

Severity

Likelihood


1

2

3

1




2







3







Critical business functions

Mervin INC. is a financial institution where most of its critical operations include;

  1. Money transfer – customers conducting business via bank accounts need to transfer money from one bank to another, thus achieving successful business operations.

  2. Leading – Mervin INC. leads loans as an investment strategy, and various entrepreneurs are free to apply for loans at any given time.

  3. Record keeping – With many new customers registering and transactions taking place every minute, the company is entitled to keeping the records, thus helping maintain business ethics.

  4. Keeping customers' money safe – This is one of the primary activities that the bank carries out. If the bank does not keep customers' money safe, it can be challenging for customers to trust it, thus making it have a low market share.

  5. Fund distribution – Banks must distribute funds to their customers depending on their needs and remain active depending on their money flow.

  6. Security – for customers to believe that the bank is safe to keep their funds, there is a need for effective security authentication, thus allowing customers to access their accounts successfully. (Kuerban et al., 2020)

  7. Enforcement focuses on suspending accounts of those who attempt to conduct illegal activities using bank transfers associated with fraud or theft. This policy allows the company to track funds associated with the fraud.

  8. Exchange rates – the company allows its customers to receive funds from all parts of the world, and it allows conversion at a fee.

  9. Sound business practices – this role is critical to the company as it allows it to safeguard the money in the bank. Sound business practices involve good business-making strategies, such as customers leading loans and those not leading.


Company organization chart

The organization chart plays a crucial role in Mervin INC. It allows various employees to be allocated various tasks depending on the management level, thus allowing it to serve its customers effectively. The company's organizational chart starts from top management, where powers are effectively distributed towards the lowest level of the organization. Below is the organizational chart of the organization.


Assessment Description: A company profile helps to convey a business' value proposition to customers and identifies the services and products the company offers. A company profile is a window into the 1



Reference

Kuerban, M., Maihemuti, B., Waili, Y., & Tuerhong, T. (2020). Ecological risk assessment and source identification of heavy metal pollution in Urumqi, China vegetable bases, using the positive matrix factorization (PMF) method. PloS one, 15(4), e0230191.

Kumar, A. (2020). Business continuity plan. South Asian Journal of Engineering and Technology, 10(2), 1-4.

Mbiru, J., Wickham, M. D., & Ayentimi, D. T. (2020). Introducing an entrepreneurial project management model. The Journal of Modern Project Management, 7(4).

Stein, V., & Wiedemann, A. (2018). Risk governance: primary rationale and tentative findings from the German banking sector. In Current issues in corporate social responsibility (pp. 97-110). Springer, Cham.