Description
You are to write your own business plan for a small business that you want to own in the future in the area of IT/ Cybersecurity.
This is about 2 months long project. It is divided into parts, 1 part will be due by every Saturday.
- Company Description - Week 1 10/10
- Market Analysis - Week 1 - 10/10
- Competitive Analysis - Week 3 - 10/17
- Description of Management and Organization - Week 4 - 10/24
- Breakdown of Products and Services - Week 5 - 10/31
- Marketing Plan - Week 6 - 11/7
- Sales Strategy - Week 6 - 11/7
- Request for Funding - Week 7 - 11/14
- Financial Projections - Week 7 - 11/14
- Executive Summary - Week 18 (This is the last thing you write.) - 11/21
Explanation & Answer
hi, kindly check the answer
Running head: CYBERSECURITY
1
Business Plan
Student’s Name
Institutional Affiliation
CYBERSECURITY
2
Company Description
Connolly's Cyber is a new company that provides quality information and technology
services. The company solves the problems of protecting computers, electronic devices, servers,
mobile devices, and data from spiteful attacks. We strive to inhibit unauthorized data access by
any third party. The protection offered by our information and Technology Company ensures
that primary owners of the protected devices and information on the ultimate right to share their
knowledge. Our company is located on Leon Street, behind Diamond bank in Temple city. Our
main aim is to provide electronic devices with adequate security for their data. The workplace
computers and servers need protection from intruders (Newhouse, Keith, Scribner & Witte,
2017). Connolly's intends to ensure that only authorized personnel can access the data. If data
lands in the wrong hands, rival companies may use the information to pose competition. Our
company is equipped with up to date security systems that will minimize hacking and any other
form of compromise.
Market Analysis
The cybersecurity market is strongly growing. The cybersecurity market will probably be
shaping our lives in the next decade and beyond. The market is made up of cybersecurity
software sales and other similar services. Cybersecurity can be divided into information security,
application security, network security, and operational security. As of 2019, North America was
the leading region in the cybersecurity market. In August 2019, Cisco Systems Inc., a
multinational company in America, concluded acquiring a France-based company, Sentryo
(Newhouse, Keith, Scribner & Witte, 2017). The move by Cisco is aimed at enhancing the
company's security in operational technology. The market is improving with the invention of
better technology.
CYBERSECURITY
3
The increased use of unlicensed software threatens the market. Software piracy, mostly
on the internet, is a current issue in the cybersecurity market. In June 2018, the BSA global
software survey recorded a 2% drop in pirated software installation rates compared to 2016 and
2017 (Lamba, Singh, Dutta & Rela, 2016). The previous worrisome trend, where 37% of the
installed software was unlicensed, inhibits the cybersecurity markets market's growth. On the
brighter side, the government to solve cybersecurity problems has helped develop the industry.
For instance, in 2019, the UK government publicized a 36 million project to guard its business
against cyber-attacks.
Competitive Analysis
The competition in the cybersecurity field grows with the invention of advanced
technology. The introduction of software that can take a picture of an intruder who may be trying
to access one's phone's private information has improved security. Information and technology
companies' ability to provide reliable services is another aspect of competition in the
cybersecurity field. To survive comfortably in the area, a company must use the current
technology and offer dedicated services to the customers.
Description of Management and Organization
To enhance our company's performance, I intend to employ efficient and informed
employees experienced in the information and technology field. For a start, I am planning to hire
two information and technology experts and two marketing agents. Having been in the
department of cybersecurity as an employee for the last eight years, I have learned enough to be
in charge of the company. I believe that I can provide good insight into t...