Hiles, A. (2002). Enterprise risk assessment and business impact analysis best practices. Brookfield, Conn.: Rothstein Associates.
IT plays a critical role in most of the business and therefore it will be crucial to understand its mechanisms towards various businesses. In relation to this, the business people have a great obligation to play in relation to the privacy of the business’ data as well as any transactions that are conducted electronically. The business people should therefore use the business continuity plans in mitigating the risks that are associated with IT systems.
Online security will serve the company positively since many systems are normally at the risk of malware, viruses, spam as well as hacking that interferes with the business’s progress.
References
Hiles, A. (2002). Enterprise risk assessment and business impact analysis best practices. Brookfield, Conn.: Rothstein Associates.
James Cadle & Malcolm Eva. (2014). Business Analysis (3rd ed.). Swindon: BCS Learning & Development Limited.
McCrackan, A. (2005). Practical guide to business continuity assurance. Boston: Artech House.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
