IT Supply Chain Paper Example

Paper Type:  Essay
Pages:  4
Wordcount:  891 Words
Date:  2022-10-23

In supply chain management, technology has played an essential role in improving it by communicating with the customers and ensuring that goods are delivered on time. However, technology threats like cyber-attacks several firms in the United States. Practically, every company globally whether public or private depending on the third-party software in the supply chain. This issue makes it critical for different company operations and makes a firm attractive for cyber-attacks. The other threat in the supply chain is the workers.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

The supply chain has growingly become the center of cyber-attacks since a weak link in the supply chain might easily give the criminals access to large companies. These attacks are complicated as it is difficult to detect their vulnerabilities in the software. Currently, the supply chain has become digitalized, and this is the reason the number of companies suffering cyber-attacks has increased. The same technologies which promote higher innovation, agility, and reduction of cost in the current supply chain might also increase cyber risks including theft, malware spread, tampering, and counterfeiting.

Cyber-attack is a major problem in supply chain management though most companies seem to be unprepared for it (DiPietro, 2017). Cyber-attack in supply chain makes companies lose money, disruption of operations, that their operations were disrupted, undermining their client's trust, and losing customers to the competitors. In the United States, the preparedness for cyber attacks is very weak. Most firms only do well in managing the risks that are linked to cyber threats in other specific forms of business as compared to the supply chain. The supply chain is a vexing challenge since different areas are struggling with it including the private sector and government (DiPietro, 2017). It is hard for most firms to ensure that their security system and protocols are good but provides that the suppliers have the required degree of security.

In mitigating the issue of attack on supply chain management, companies need to think of a supply chain software (DiPietro, 2017). In supply chain management, software term is not mainly used, but when a company takes that angle, then it leverages several pieces and parts in supply chain management. Also, the companies operating supply chain management have several suppliers, and all the parties need to be trusted (DiPietro, 2017). In this case, the software used is similar, and it should entail the supplier, employees, consultants, service providers, and contractors. Therefore, the software can be used in understanding the quality of the products supplied. Furthermore, in mitigating the risk of cyber-attacks, a company needs to survey the whole business and network to know where there is sensitive data (DiPietro, 2017). The company also need to know the security around the data and the security that needs to be wrapped around it. The most significant protection needs to be around crown jewels, and a company should reduce access to the data and observe the happenings. Since a lot of security defenses have evolved, it is essential to monitor the company's network in case there is a malicious activity (DiPietro, 2017).

Although technology is the main threat to supply chain management, labor risks should not be overlooked. The employee's union, changes in the labor regulation, fluctuations with staff turnover, retention, and workplace safety might undo well-versed logistics strategy. Therefore, it is vital for the supply chain executives to monitor the current employment projections and changes in public and private sectors which affects most worker that seeks employment opportunities in a supply chain firm. When evaluating a supply chain fraud, the employees should not be overlooked. In a poll that was conducted by Deloitte Financial Advisory Services LLP amid about 20160 professionals from technology, consumer products, banking and securities, and distribution and retail employees were identified as the main source of supply chain fraud risk ("Don't Overlook Employees When Evaluating Supply Chain Fraud, Abuse", 2015). After employees, vendors and other third parties were also identified as potential threats. Additionally, one-quarter of the professional said that most organizations had experienced supply chain fraud, but they do not have any program in place in detecting or preventing the risks.

The best way of resolving the issue of employees being involved in supply chain risk is understanding the needs of the current workforce as employees might collude with other parties in making a firm lose a large sum of money. Performing supply chain risk assessment can also assist in breaking down the company's silos and set management and employees of a strategic path ("Don't Overlook Employees When Evaluating Supply Chain Fraud, Abuse", 2015). Furthermore, reinforcement and training using the appropriate human resource measures can help in mitigating the supply chain risks.

Conclusion

In conclusion, employees and technology play an essential role in supply chain management. Through technology, goods can be tracked, delivered in real time, and cost reduced. However, technology has made supply chain to suffer risks like cyber-attacks which makes a company lose money and trust from its potential customers. Therefore, a software which authenticates information and products from the third parties especially vendors should be introduced in organizations. Furthermore, companies should ensure that they meet the needs of the employees so that they do not partner with the third parties in bringing a company down.

References

Don't Overlook Employees When Evaluating Supply Chain Fraud, Abuse. (2015). Retrieved from https://deloitte.wsj.com/riskandcompliance/2015/09/22/dont-overlook-employees-when-evaluating-supply-chain-fraud-abuse/

DiPietro, B. (2017). Assessing Cybersecurity Risks in the Supply Chain. Retrieved from https://blogs.wsj.com/riskandcompliance/2017/04/20/assessing-cybersecurity-risks-in-the-supply-chain/

Cite this page

IT Supply Chain Paper Example. (2022, Oct 23). Retrieved from https://proessays.net/essays/it-supply-chain-paper-example

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism