You should make a list of factors that have significant impact on the organization and factors that drive growth in the industry. The enterprise should also have optimized the IT costs by ensuring a proper risk management procedure is determined in order to reduce the cost incurred due to impulsive reacting during emergencies.
The firm therefore faced a threat of losing its customers from the incident. Finally, iPremier should make a statement to reflect that they made every attempt to notify the public immediately after the attack to prevent any potential fraud to occur on customer credit cards.
Because of poor preparation in years prior, iPremier was only able to be reactive to the situation. Implementation framework helps in weeding out non actionable recommendations, resulting in awesome iPremier B: Being an IT based enterprise, iPremier ought to have ensured that the business and the IT strategy are aligned in order to achieve all round results.
Tell us what you need to have done now! How well did iPremier perform during the minute attack event? TJ Maxx did not discover the information leak for several months, and did not inform the public for some time after that. Be very slow with this process as rushing through it leads to missing key details.
Brushing up HBR fundamentals will provide a strong base for investigative reading. When we are writing case study solution we often have details on our screen as well as in our head. Once realized, the strategic vision ought to be planned, managed and communicated in different perspectives.
This put the company in a significant disadvantage, and created a bigger problem than what was necessary. You can use the following strategy to organize the findings and suggestions. Take a small break, grab a cup of coffee or whatever you like, go for a walk or just shoot some hoops.
This risked destroying the goodwill, credibility and image of the company: Along with no emergency plan to implement, or one that was so outdated it was no help, there was no strategy of who needed to be contacted and who needed to be communicating in such a situation.
Denial of Service Attack Graphic Novel Version Case Study Solution Once you have developed multipronged approach and work out various suggestions based on the strategic tools. Time line also provides an insight into the progressive challenges the company is facing in the case study.
Each individual was calling anyone and everyone in a panic. It is important to note that most attackers plan and organized an attack within a definite time limit in order to achieve maximum financial damage.
It was reported that the attacks were from Chinese IP addresses and the targeted the ESTsoft ALZip application for compression, and they uploaded a malware to the update server of the same application.
Their Website monitoring system and Internet security services did little to nothing to help resolve the situation. If this company was going to be contracted with iPremier, then the endeavor should have been a partnership where information was accessible when needed.
For example you can recommend a low cost strategy but the company core competency is design differentiation.
HBR case studies provide anecdotal instances from managers and employees in the organization to give a feel of real situation on the ground. As a result the website was down and no one knew what to do solve the problem.
As far as I know, the police would have not been able to do anything to help the situation and at the same time the press would have access to the story. They should make some changes to effectively solve their security problem.
It is important for the enterprise to establish a proper response procedure to such emergencies in order to ensure timely and effective rectification of breaches without compromising the data of stakeholders. The present procedure was out of date, an aspect that made it difficult to note the way forward.
On the other hand, if iPremier takes no action, and customer cards are compromised, they will face strong customer dissatisfaction and potential legal ramifications as well. Nevertheless, the company announced that sensitive consumer data was not compromised in the breach.
Admin BusinessCase StudyInformation TechnologyManagement No Comments The iPremier company was founded in and became a successful player in the internet-based commerce industry."The iPremier Co.: Denial of Service Attack." On January 12,iPremier Web servers were brought to a halt after a denial-of-service (DoS) attack had occurred.
How well did the iPremier Company perform during the minute attack? In what ways were the company's operating procedures deficient in responding to this attack? In what ways. An inadequately third-party managed and configured router/firewall allowed hackers to execute a DOS (Denial of Service) attack on iPremier.
I recommend purchasing a new firewall solution that will be managed and configured by the Company’s IT staff internally. The Ipremier Company (a): Denial of Service Attack Case Analysis The iPremier Company (A): Denial of service Attack Case 2—2 MIS Management Information Systems 4 December Summary of the problem The case presents a specific problem that has taken place in iPremier, a Seattle based company that was founded.
There perpetrated a “doing whatever it takes” type of culture in the company which meant that employees will do whatever it takes to get the project done on time. iPremier’s website had a Denial of Service Attack.5/5(1). iPremier was a successful, high-end, web-based retailer that was shut down by a distributed denial of service attack (DDoS) for 75 minutes.
Like many companies, iPremier was not well prepared for this attack. iPremier Company: Denial of Service Attack Case Study Problem Statement How can iPremier improve their processes in order to avoid future vulnerability?Download