Berkshire Hathaway Company’s Risk Assessment Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

Protecting personal data from cyber attacks is a significant problem faced by the specialists of the Berkshire Hathaway company. According to Amoroso, many data are stored on cloud-based servers, and it increases the risk of information theft. Therefore, it is necessary to develop a specific protection plan and assess the efficiency and quality of the implementation of the technology used.

The plan is based on several points:

  • Berkshire Hathaway potential and capabilities are sufficient to develop its activities successfully.
  • The potential risk of severe problems caused by the leakage of valuable data is significantly increasing.
  • The calculation of the possible range of threats should be carried out.
  • The development of a particular policy may help to protect the company from possible troubles and withstand hacker attacks on an electronic network.

The theft of corporate data is dangerous from different points of view.

A short-term outlook:

  • Regular attacks on an electronic database will have an adverse impact on the company’s performance.
  • Hackers’ activities will adversely affect employee safety.

L A long-term outlook:

  • The loss of credibility in the market.
  • Severe material losses and the lack of clients and partners caused by mistrust.
  • The loss of skilled specialists.
  • The problem of hiring new insufficiently experienced and qualified specialists.

Thus, it is important to assess the risk and potential impact of cyber attacks on the company’s operations, as well as offer an approach for risk assessment modeling. The presented tables show the relationship between the impact of the negative consequences of hacker attacks on the state of the company and its development.

Protecting access to personal data is essential. The procedure should be clear for all participants of the plan:

  • Any approach should take into account the possibility of implementing a particular technology to protect each employee.
  • A probable hypothesis is the theory that risk can occur at any time.
  • The calculation of potentially problem areas may help to avoid data theft.
  • Monitoring and observation are rather effective ways to identify vulnerable areas.
  • Each employee should be aware of the importance of the work carried out.
  • The team of specialists is better than one person.
  • The rationale for risks should be logical and understandable for all stakeholders.
  • Security will cost you less than restoring company’s prestige.

Works Cited

Amoroso, Edward. Cyber Attacks: Protecting National Infrastructure. Elsevier, 2012.

Berkshire Hathaway. Berkshire Hathaway Inc., 2017. Web.

Finkle, Kim, and Skariarchan, Dhanya. “Reuters. Web.

Johnstown, Alice. “The Economist. Web.

Rogers, Jerry. Global Risk Assessments. 4th ed., Global Risk Assessments, 2012.

Scoldra, Paul. “The 9 Worst Cyber Attacks of 2015.” Business Insider. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, March 21). Berkshire Hathaway Company's Risk Assessment. https://ivypanda.com/essays/berkshire-hathaway-companys-risk-assessment/

Work Cited

"Berkshire Hathaway Company's Risk Assessment." IvyPanda, 21 Mar. 2021, ivypanda.com/essays/berkshire-hathaway-companys-risk-assessment/.

References

IvyPanda. (2021) 'Berkshire Hathaway Company's Risk Assessment'. 21 March.

References

IvyPanda. 2021. "Berkshire Hathaway Company's Risk Assessment." March 21, 2021. https://ivypanda.com/essays/berkshire-hathaway-companys-risk-assessment/.

1. IvyPanda. "Berkshire Hathaway Company's Risk Assessment." March 21, 2021. https://ivypanda.com/essays/berkshire-hathaway-companys-risk-assessment/.


Bibliography


IvyPanda. "Berkshire Hathaway Company's Risk Assessment." March 21, 2021. https://ivypanda.com/essays/berkshire-hathaway-companys-risk-assessment/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1