Assessment 3 Template: Improving Business Continuity Plan at Telstra



Assessment ?3? Template 

 

Student Name 

 

Student Number 

 

 

 

Business name 

Telstra Corporation Limited

Industry name 

Telecommunication

Business Background 

Telstra is an Australian telecommunications company That provides mobile, internet and enterprise services. The company was established in 1901 and is a key component of the country’s communications infrastructure and offers new-generation technologies to millions of customers (Telstra, 2024)

.

Industry Background 

The telecommunication industry is a key enabler of world connectivity through mobility, Internet and satellite. With constant developments in 5G and IoT, this company has to deal with issues such as security and legal restrictions and it is an Australian market leader in this sector Telstra.  

 

 

 

 

Part 1 – Business Risk Register 

 

Risk Name 

Risk Description 

Likelihood 

Impact 

Priority 

Impact 

Mitigation measure 

Cybersecurity Breaches

As a telecommunication company, Telstra is vulnerable to cyber-criminal activities in which customer data as well as the company’s network can be compromised.


High 

 Financial, operation, and reputational risks

 Critical

 High

 Improving the system of protection against cyber threats, constant training of the staff, and adopting advanced technologies of security.


Natural Disaster 

Australia is vulnerable to natural disasters that might affect important pieces of infrastructure, for instance, towers and data centres.

 

Moderate

 

disturbances to the availability of services, monetary damages 

 High

Moderate 

Creating capacity as structures to withstand disasters, cloud-based backup for services, and improving the functional emergency teams.

 

Network Equipment Failure 

A failure of network equipment can cause the termination of communication services across the country.

 

Moderate

 

service downtime, customer dissatisfaction 

 High

Moderate  

Preventive measures, backup methods and mechanisms and quick intervention measures in case of equipment breakdowns.

 

Supply Chain Disruptions 

 Equipment is sourced from external suppliers meaning that Telstra could be badly affected by either supply chain delays or interruptions.


Low 

servicing after a certain time, increase in the expenses 

 Moderate

Low 

 Using multiple suppliers and the development of sound supplies inventory management systems. 

 Regulatory risks

 New laws and regulation policies may pose risks to the existing business in operation since they affect how Telstra operates its business (Zaid et al. 2020, p.2).




Moderate  

Expenses incurred are high with fines involved as well as change of operations. 

Moderate 

 Moderate

 Developing and sustaining compliance programs, and closely observing such regulations to be in line with current developments.


 

Part 2 – Business Impact Analysis 

 

Critical Business Activity 

Description 


Impact of loss 


RTO 


 Network Service Provision

 

1. Selling of mobile and internet service to its customers.

2. Maximum downtime: 2 hours.

3. Relies on third-party suppliers for the acquisition of networks and related services.



 But from another perspective, we have reduced revenues, unhappy customers, the risk of losing customers, and damaging the company’s reputation (Hassan & Ahmed 2023, p.2).


 2 Hours

Data Center Operations


 1. Protection of organizational and customers’ information in data centers which are organizational facilities vital for data storage.

2. Maximum downtime: 6 hours.

3. Calls for cloud service providers and infrastructure vendors for continuation (Alzoubi et al. 2020, p.580).


 Leaked customer information, regulatory financial penalties, the loss of key organizational processes, and brand image deprecation.

 6 Hours

 Customer Support Services

 1. Providing round-the-clock customer service for such questions and concerns.

2. Maximum downtime: 4 hours.

3. Relies on third-party communication solutions and telecom facilities



 Bigger volumes of complaints from customers, open customer issues which take time to resolve, low customer retention, and Impact on the company’s reputation.


 4 Hours

 Billing and Payment Processing

 1. Customer transaction management and invoicing for the services they receive from the company.

2. Maximum downtime: 24 hours.

3. Depend on financial institutions and other payment terminals for capturing.


 Decreased operating cash flows and other expenses, regulatory fines, threats of service termination due to failure to pay, and damage to the company’s image (Fraser et al. 2021, p.3).


 24 Hours

 


 



Part 3 – Incident Response Plan 

 

Incident type 

Actions are required to eradicate/resolve the incident 

Resources are required to resolve the incident 

Who is responsible for remediation actions 

Systems/services to be prioritised 

Systems/services will be affected during the remediation process and how 

Cyberattack

Contain affected assets, inform security stakeholders, start an investigation, deploy mitigation, recover from desirable state, and enhance security controls

Cybersecurity team, IT staff and investigators (Polinkevych et al. 2021, p.100).

 

Chief Information Security 

Customer data and network services  

For efficiency, servers and databases that interact with customers may be shut down locked and restored at a later time.

Natural Disaster

Estimate the extent of the problem, switch to auxiliary facilities, reconstruct the network flow, inform clients, and mobilize personnel to repair physical premises.

 

Backup systems, field technicians and emergency response team. 

Head of Network Operations  

Data centres for networks and communication lines. 

Network operations may be disrupted in all the affected areas until repair is done and services are redirected. 

 Network Equipment Failure

Isolate the problem, find out where the traffic is congested, swap or fix the gears, and make the end user’s flow. 

Field engineers, backup hardware and network technicians. 

Head of Technical Operations  

Core network infrastructure includes routers. 

Individual pockets of service interruption in various parts of the globe as traffic is redirected and substandard hardware is fixed. 

Supply Chain Disruption 

Choose other suppliers, speed up delivery, change the timings, and study contracts for fines or extensions.  

Logistic Experts and alternate suppliers  

Head of the supply chain 

Supply of network components  

Continuing construction or renovation jobs may however be affected, meaning that service delivery or maintenance is slower.  

 

 

 

Part 4 – Recovery Plan 

 

Critical Business Activities 

Preventative/Recovery Actions 

Resource Requirements/ Outcomes  

Recovery Time Objective 

Responsibility 

Network Service Provision 

Preventative Actions: Procedures such as routine checkups on network structures, duplicity of the network paths, and usage of technology that constantly checks the network for signs of emerging problems (Szczepaniuk & Szczepaniuk 2021, p.7).


Recovery Actions: Redirect the network traffic to an alternate path, swap or fix failed components in the network and recover the services from a different route.

Resources: Field engineers, network monitoring tools, backup hardware, and backup routing systems.

Outcomes: Instant identification of the error on a network and containing any resultant effect on the service delivery to clients and immediate rectification (Ruiz-Canela López 2021).

 

2 Hours

Head of Network Operations  

Data center Operations

Preventative Actions: Inspect regularly such data centre surroundings, Back up data to the cloud and physically protect data centres.


Recovery Actions: Convert to cloud-based backup, recover lost or corrupted information and possibly replace faulty physical servers

Resources: Disaster recovery team in information technology, cloud backup service providers, and physical structures’ support systems.

Outcomes: Restoration with low data loss rates and brief service disruption.


 6 Hours

 Data center Manager

Customer Support Services  

Preventative Actions: Create more than one help desk (web, phone, and chat), create several backups ‘help desks, and instruct employees concerning the actions to take in an emergency.


Recovery Actions: Switch on other customer support options, divert the calls to backup help desks, and include remote help desk employees


Resources: Remote call centre tools, cloud-based communication tools, other human support resources and other support centres.

Outcomes: That will entail having a checking of customer service being open at all times, observing that there are no bottlenecks in service delivery and that the customers are not let down by the various service providers

 4 Hours

Customer Support Manager  

Billing and payment processing

Preventative Actions: Updating of the billing software frequently, relationships of the company with more than one of the payment gateways and frequent testing of the payment systems.


Recovery Actions: Move payment processing to other payment platforms, regain access to the system and contact all financial merchants on the matter for the optimization of cash flow. 

Resources: A payment gateway can be recognized as an essential component of the IT department, financial institutions, alternate payment gateways, and billing software.

Outcomes: Payment processing without much disruption, providing cash flow, and at the same time keeping up the satisfaction of customers. 

24 Hours  

 Chief Financial Officer (CFO) (Telstra 2024)



 

 

 





Part 5 – Reflection

Despite the work that Telstra has done, there are some areas, which should be improved to increase the general level of resilience or business continuity plan (BCP). Below are detailed assessments and recommendations across the four pillars of BCP: are in the four different stages consisting of assessment, preparedness, response, and recovery.


1. Assessment: Perform Additional Regularity of the Risk Assessment Exercise

For Telstra to continue being vigilant about new threats more risk analysis should be conducted more often. For now, the risk assessments hold their reviews once a year but looking at the nature of the telecommunications industry this should be changed to at least a quarterly or bi-annual affair to capture changing risks, such as cybersecurity, changes in regulatory requirements or challenges posed by market entrants. Introducing constant tabletop exercises using crews from different departments is also useful in the duplication of available crises to reveal gaps in the organization’s processes and structures. These assessments should integrate findings from such events that occurred in the industry over the recent past to ensure that the BCP is informed by the current threats (Marshall et al. 2023, p.2).

2. Preparedness: Enhance the Live Simulation Disaster Contingency Drill

Improving DR simulation is particularly important so that the employees at Telstra get adequate training on what to do when a disaster strikes. DR drills may currently be limited to technical elements of server recovery for instance; however, ensuring that customer service teams, operations or even partners are incorporated into the exercise enhances readiness. Consequently, organizations can use full-scale simulations that mimic real-life disaster scenarios like data breaches or natural disasters to discover miscommunications and coordination breakdowns between the teams. This will not only help create muscular memory for the company but will also enhance the culture of preparedness amongst the organizational workers.

3. Response: Provide funds to Rapid Response Technology for Cyber Incidents

As the threat of cyberattacks becomes even more advanced, Telstra should devise ways by which the company can control such threats better through the use of higher-end technological solutions such as automated response systems. At present, manual response processes can cause delays in facing and addressing the problem which thereby worsens the consequences of the attack. Through the use of SOAR solutions, he said Telstra can integrate its processes towards addressing incidents and disadvantages. These tools can give immediate notification, implement threat counteractions automatically and the intercommunication of security teams. Not only does it save time to respond automatically, but it also greatly decreases the chances of mistakes in dire situations.

4. Recovery: Improve relations with all the cloud service providers to increase RTO (Schlette et al. 2021, p.2526).

Since data centres play a crucial role in Telstra’s core processes, improving interaction with cloud service providers will greatly affect its recovery. Telstra can grow strategic alliances involving the cloud to take advantage of redundancy and failover that leads to lower RTOs. Besides, the shift to hybrid cloud solutions where resources are distributed more freely can help to recover quicker from incidents. The reviewing and practising of cloud recovery solutions should be carried out on a routine basis about the atmosphere and functionalities of Telstra to improve its elasticity in the course of disruptions.



References

Alzoubi, H M, Alshurideh, M, Kurdi, B A & Inairat, M 2020, ‘Do perceived service value, quality, price fairness and service recovery shape customer satisfaction and delight? A practical study in the service telecommunication context,’ Uncertain Supply Chain Management, vol. 8, no. 3, pp. 579-588. viewed on 5 October 2024. <https://research.skylineuniversity.ac.ae/id/eprint/8/>.

Fraser, J R Quail, R & Simkins, B eds 2021, Enterprise risk management: Today's leading research and best practices for tomorrow's executives. John Wiley & Sons. viewed on 5 October 2024. <https://www.researchgate.net/profile/Betty-Simkins/publication/299904292_Enterprise_Risk_Management_An_Introduction_and_Overview/links/62ab5ef523f3283e3aeca997/Enterprise-Risk-Management-An-Introduction-and-Overview.pdf>.

Hassan, A & Ahmed, K 2023, ‘Cybersecurity’s Impact on Customer Experience: An Analysis of Data Breaches and Trust Erosion,’ orientreview, vol. 15, no. 9, pp. 1–19. viewed on 5 October 2024. <https://orientreview.com/index.php/etmibd-journal/article/view/17>.

Marshall, A Wilson, C A & Dale, A 2023, ‘Telecommunications and natural disasters in rural Australia: The role of digital capability in building disaster resilience,’ Journal of Rural Studies, vol. 100, p.102996. viewed on 5 October 2024. <https://www.sciencedirect.com/science/article/pii/S0743016723000530>.

Polinkevych, O Khovrak, I Trynchuk, V Klapkiv, Y. & Volynets, I 2021, ‘Business risk management in times of crises and pandemics,’ Montenegrin Journal of Economics, vol. 17, no. 3, pp. 99-110. viewed on 5 October 2024. <https://vb.mruni.eu/object/elaba:98578018/ATTACHMENT_98578815#page=99>.

Ruiz-Canela López, J 2021, ‘How can enterprise risk management help in evaluating the operational risks for a telecommunications company,’ Journal of Risk and Financial Management, vol. 14, no. 3, p.139. viewed on 5 October 2024. <https://www.mdpi.com/1911-8074/14/3/139/pdf>.

Schlette, D Caselli, M & Pernul, G 2021, ‘A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective,’ IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2525–2556. viewed on 5 October 2024. <doi:https://doi.org/10.1109/comst.2021.3117338.>.

Szczepaniuk, E K & Szczepaniuk, H 2021, ‘Analysis of cybersecurity competencies: Recommendations for telecommunications policy,’ sciencedirect, vol. 46, no. 3, pp. 102282–102282. viewed on 5 October 2024. <doi:https://doi.org/10.1016/j.telpol.2021.102282.>.

Telstra 2024, Telstra: Broadband Internet, NBN, 5G, TV & Mobile Phone Services. Telstra.com. viewed on 5 October 2024. https://www.telstra.com.au/

Zaid, A Alwan, A & Gulzar, Y 2020, ‘Disaster Recovery in Cloud Computing Systems: An Overview,’ IJACSA) International Journal of Advanced Computer Science and Applications, vol. 11, no. 9. viewed on 5 October 2024. <https://core.ac.uk/download/pdf/350765431.pdf.>.

?





FAQ's