Tuesday, December 10, 2019
Protection of Motherboards and More Pty Ltdââ¬â¢s Assets â⬠Free Samples
Question: Discuss about the Protection of Motherboards and More Pty Ltd.s Assets. Answer: Overview of the Revenue Cycle The revenue cycle is initiated by the receipt of a customers order via the companys website, email, or telephone; after which, a picking ticket is generated. Goods are then picked against the picking ticket and customers order and packed while generating a packing slip. Its after this step that the goods are ready for delivery and a sales order is generated. The delivery goes along with a bill of lading. Invoicing then proceeds after the shipment of goods to the customer and according to the shipment details after which the firm recognizes a liability for the goods sold on credit. From here on, the cash collection begins where the customer may pay in cash or bank and according to the terms of trade where a discount of 2% is offered for any payment made within three days. Amount received in cash is then deposited to the bank. While all this is happening, the shipping department also receives incoming deliveries from suppliers. Internal Control Weaknesses, their Impact, and Possible Solutions Internal controls weaknesses Impact of the weaknesses Possible solution Lack of segregation of duties: Use of the loading dock for both the outgoing shipment to customers as well as incoming deliveries. It increases the risk of fraud, intentional manipulation, unexpected error leading to loss of goods, and delays in delivery of goods to customers. Besides, it weakens other control procedures such as physical checks. The firm should implement different docks for receiving incoming deliveries and issuing outgoing shipment. This will enable a system of checks and balances where the two departments will check against each other and reduce the risk of fraud Placing of orders without the authenticating (supporting) documents Without legally binding source documents its impossible to defend a transaction. This has led to customers denying ordering and receiving goods since there exist no source documents to authenticate the orders. The firm should implement a system where there has to exist physical source documents such as orders, delivery notes, and bills of lading. Such documents are legally binding and make it impossible for customers to deny deliveries made. Delivering goods without an invoice. That is, generating an invoice after shipment. Customers receiving the goods without the delivery note and invoices have led to them denying receiving the goods later which has led to most of the credit sales being written off as uncollectible All deliveries should be accompanied by both the delivery note and an invoice. The invoice should be generated after the packing according to the packing slip and before delivery. Upon receipt of the goods, the customer should sign both the delivery note and the invoice which immediately creates a legally binding liability. Lack of physical controls; Failure to take stock counts for two years Failure to take stock counts have led to the loss of goods witnessed in the firm due to possible fraud and theft by the employees, failed deliveries, and delivery of the incorrect amount. The stock is a very sensitive item must be well guarded (Mary, 2017). The firm should institute a policy where physical stock counts happen on a monthly basis or after a fortnight after which stock, suppliers, and shipping details should be reconciled to check against any loss of stock. Making all sales on credit with no precise credit sale policy Credit terms increase the risk of bad debts. The firm should consider selling some of the items on a cash basis or instituting a policy where a certain percentage of the invoice amount is paid either on order or delivery. Overview of the Ransomware Attack Described by F-Secures' (a cybersecurity company) Chief Research Officer, Mikko Hypponen, as the biggest ransomware outbreak in history, the malware locked computers thus preventing access and demanded ransom from the victim if they were to gain back the access to the computers. The malware which spread to several computers across the world owed to a self-replicating software which took advantage of the vulnerabilities/weaknesses and bugs in the older version of Microsoft Windows and organizations using such widows found themselves the greatest victims (Moore and David, 2017). The most affected organizations were hospitals, large firms, and government agencies. The cyber extortionist duped their potential victims into opening the malware purportedly attached in their spam email as either orders or invoices. Several firms yielded to the trick and the extortionists' ransom demands although it remains unclear on how many firms did so. Appropriate Controls to protect the Firm from a Potential Ransomware Attack. Application controls Validity checks Configurable controls Such controls are defined at the system generation point Completeness and validity checks They check data being entered for validity and completeness (Moore and David, 2017) Authentication controls These controls provide an application system authentication mechanism Input controls They serve to ensure that data integrity feeds into the system only from upstream sources. Forensic controls They ensure scientifically correct data General controls Backup and recovery procedures To ensure the firms operation run continuously Integrity checks Checking that email and other data come from secure sources Encryption Coding of the firms data to ensure they are unreadable by other sources Physical access controls To prevent unauthorized access to both the hardware and software including emails Virus and malware scanning Scanning the computers for malware which might cause loss of data Firewall security To protect the firms internet and data from external threats In-depth white-listing and blacklisting Blocks unknown and unwanted applications and installation of apps from unknown sources Compliance with internal IT policies Such policies may limit usage of application not supported by data loss prevention Conclusion and Recommendations The internal control weaknesses of Motherboards and More Pty Ltd pose a huge risk of fraud and massive loss of revenue for the firm. As such, it is necessary to implement several internal controls to safeguard the firm's assets and deter fraud in the firm. Besides, given the alarming rise of cyber-attacks on organizations, it is advisable for the firm to implement several applications and general controls to prevent loss and corruption of its data in future. References Mary, A. (2017). Impact of effective internal controls in the management of Mother and Child Hospital Akure, Ondo State, Journal of Finance and Accounting 5 (1): 61-73 Moore, T., and David, P. (2017). Special Issue: Strategic Dimensions of Offensive Cyber Operations, Journal of Cybersecurity 3(1): 2057-2093
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.