Due to the manufacture of high-quality goods as a result of certification, the Coca-ColaCompany has been able to attract new customers hence resulting in an increased volume of salesto the company. The acquired certification by the Coca-Cola Company has positively impactedits business operation. The company is currently experiencing smooth operations as it hascomplied with the requirements of all regulatory authorities (Turker, 2018 p.75). This has alsohelped the Coca-Cola Company to have increased market share due to increased acceptance invarious geographical regions (Turker, 2018 p.87). Considering the company operates in a verycompetitive industry, its compliance with various certifications provisions has enabled it to livethe competition. This is because it faces no operational frictions from the society as well as thelegal authority.
COCA-COLA COMPANY INFORMATION SECURITY 13Threat identification and Risk assessmentInformation is the source of life in an organization, and it has the power of building or destroyingthe reputation of an organization. As a result, the information security management system ofany company should ever be under a tight security infrastructure. Due to technologicaladvancement, information security systems of organizations have become prone to attack byunaccountable security threats (Peltier, 2016 p.75). The Coca-Cola Company should employ themost appropriate information technologies to secure their information from leaking to maliciousindividuals who can interfere with the integrity and reliability of the information. For effectiveinformation security, models should be put in place to permit early identification of threats fromhackers and cyber terrorist so that mitigation measures can be implemented.It is recommended that Coca-Cola Company conducts a frequent assessment of its externalenvironment to establish all the possible threats that their information security system could befacing. It will also help in determining the reliability of their used information security systemsas it could be using an outdated security system. Moreover, the company should adopt theProduct-Life-Cycle model to help in effective threat identification (Guinée et al, 2017 p.727).The Coca-Cola Company should also integrate its information security systems with firewallsand intrusion detection software. With the use of intrusion detection software, the company’sinformation security systems will be secured from all form of threats. The software will alsonotify the company attempts of unauthorized access into their security systems thus ensuringmeasures can be taken to prevent such access (Lopez et al, 2016 p.499). Firewalls will help inidentifying any attempt by unauthorized individuals to penetrate their information networkstructure by availing a timely threat recognition mechanism. On the other hand, risk assessmentwill be vital in enhancing the information security of the Coca-Cola Company. This is because it
COCA-COLA COMPANY INFORMATION SECURITY 14will be used in identifying the risk areas of the used information security system which can be aloophole for facilitating a security breach.