The revenue cycle is initiated by the receipt of a customer’s order via the company’s website, email, or telephone; after which, a picking ticket is generated. Goods are then picked against the picking ticket and customers order and packed while generating a packing slip. It’s after this step that the goods are ready for delivery and a sales order is generated. The delivery goes along with a bill of lading. Invoicing then proceeds after the shipment of goods to the customer and according to the shipment details after which the firm recognizes a liability for the goods sold on credit. From here on, the cash collection begins where the customer may pay in cash or bank and according to the terms of trade where a discount of 2% is offered for any payment made within three days. Amount received in cash is then deposited to the bank. While all this is happening, the shipping department also receives incoming deliveries from suppliers.
Internal controls weaknesses |
Impact of the weaknesses |
Possible solution |
Lack of segregation of duties: Use of the loading dock for both the outgoing shipment to customers as well as incoming deliveries. |
It increases the risk of fraud, intentional manipulation, unexpected error leading to loss of goods, and delays in delivery of goods to customers. Besides, it weakens other control procedures such as physical checks. |
The firm should implement different docks for receiving incoming deliveries and issuing outgoing shipment. This will enable a system of checks and balances where the two departments will check against each other and reduce the risk of fraud |
Placing of orders without the authenticating (supporting) documents |
Without legally binding source documents it’s impossible to defend a transaction. This has led to customers denying ordering and receiving goods since there exist no source documents to authenticate the orders. |
The firm should implement a system where there has to exist physical source documents such as orders, delivery notes, and bills of lading. Such documents are legally binding and make it impossible for customers to deny deliveries made. |
Delivering goods without an invoice. That is, generating an invoice after shipment. |
Customers receiving the goods without the delivery note and invoices have led to them denying receiving the goods later which has led to most of the credit sales being written off as uncollectible |
All deliveries should be accompanied by both the delivery note and an invoice. The invoice should be generated after the packing according to the packing slip and before delivery. Upon receipt of the goods, the customer should sign both the delivery note and the invoice which immediately creates a legally binding liability. |
Lack of physical controls; Failure to take stock counts for two years |
Failure to take stock counts have led to the loss of goods witnessed in the firm due to possible fraud and theft by the employees, failed deliveries, and delivery of the incorrect amount. |
The stock is a very sensitive item must be well guarded (Mary, 2017). The firm should institute a policy where physical stock counts happen on a monthly basis or after a fortnight after which stock, suppliers’, and shipping details should be reconciled to check against any loss of stock. |
Making all sales on credit with no precise credit sale policy |
Credit terms increase the risk of bad debts. |
The firm should consider selling some of the items on a cash basis or instituting a policy where a certain percentage of the invoice amount is paid either on order or delivery. |
Described by F-Secures' (a cybersecurity company) Chief Research Officer, Mikko Hypponen, as the biggest ransomware outbreak in history, the malware locked computers thus preventing access and demanded ransom from the victim if they were to gain back the access to the computers. The malware which spread to several computers across the world owed to a self-replicating software which took advantage of the vulnerabilities/weaknesses and bugs in the older version of Microsoft Windows and organizations using such widows found themselves the greatest victims (Moore and David, 2017). The most affected organizations were hospitals, large firms, and government agencies. The cyber extortionist duped their potential victims into opening the malware purportedly attached in their spam email as either orders or invoices. Several firms yielded to the trick and the extortionists' ransom demands although it remains unclear on how many firms did so.
Application controls |
Validity checks |
|
Configurable controls |
Such controls are defined at the system generation point |
|
Completeness and validity checks |
They check data being entered for validity and completeness (Moore and David, 2017) |
|
Authentication controls |
These controls provide an application system authentication mechanism |
|
Input controls |
They serve to ensure that data integrity feeds into the system only from upstream sources. |
|
Forensic controls |
They ensure scientifically correct data |
|
General controls |
Backup and recovery procedures |
To ensure the firm’s operation run continuously |
Integrity checks |
Checking that email and other data come from secure sources |
|
Encryption |
Coding of the firm’s data to ensure they are unreadable by other sources |
|
Physical access controls |
To prevent unauthorized access to both the hardware and software including emails |
|
Virus and malware scanning |
Scanning the computers for malware which might cause loss of data |
|
Firewall security |
To protect the firm’s internet and data from external threats |
|
In-depth white-listing and blacklisting |
Blocks unknown and unwanted applications and installation of apps from unknown sources |
|
Compliance with internal IT policies |
Such policies may limit usage of application not supported by data loss prevention |
The internal control weaknesses of Motherboards and More Pty Ltd pose a huge risk of fraud and massive loss of revenue for the firm. As such, it is necessary to implement several internal controls to safeguard the firm's assets and deter fraud in the firm. Besides, given the alarming rise of cyber-attacks on organizations, it is advisable for the firm to implement several applications and general controls to prevent loss and corruption of its data in future.
Mary, A. (2017). “Impact of effective internal controls in the management of Mother and Child Hospital Akure, Ondo State”, Journal of Finance and Accounting 5 (1): 61-73
Moore, T., and David, P. (2017). “Special Issue: Strategic Dimensions of Offensive Cyber Operations”, Journal of Cybersecurity 3(1): 2057-2093
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Protection Of Motherboards And More Pty Ltd. Retrieved from https://myassignmenthelp.com/free-samples/protection-of-motherboards-and-more-pty-ltd.
"Protection Of Motherboards And More Pty Ltd." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/protection-of-motherboards-and-more-pty-ltd.
My Assignment Help (2019) Protection Of Motherboards And More Pty Ltd [Online]. Available from: https://myassignmenthelp.com/free-samples/protection-of-motherboards-and-more-pty-ltd
[Accessed 05 March 2021].
My Assignment Help. 'Protection Of Motherboards And More Pty Ltd' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/protection-of-motherboards-and-more-pty-ltd> accessed 05 March 2021.
My Assignment Help. Protection Of Motherboards And More Pty Ltd [Internet]. My Assignment Help. 2019 [cited 05 March 2021]. Available from: https://myassignmenthelp.com/free-samples/protection-of-motherboards-and-more-pty-ltd.
For years now, MyAssignmenthelp.com is providing affordable essay help to millions of students worldwide. Our essay assistance services have helped us in assisting students with even the toughest essay assignments. We take pride in the fact that we cater the best assistance to search terms like help me with my essay. We offer affordable services in the fastest way possible. For our fast delivering services, students trust us with their urgent essay assignment needs. Two of our most popular essay writing services are maths essay help and English essay help.
Answer: The main focus was on the processing of the lifecycle of the activity. The lifecycle of an activity states the fact that the navigation in between the phases are stated in this section. The stage consists of the 6 phases namely the onCreate() , onStart() , onResume() , onPause() , onStop() , and onDestroy(). This week also focuses on the functioning of the dialog window with the help of the activity that is used. This week is also conc...
Read MoreAnswer: Part 1 The project charter document is developed using the case study project of ‘Development of Mobile Application and Website for Globex-I Crop Project’. The main purpose of the report is to provide the stakeholders with information aligning with the development of the improved communication and development. The information would be transferred about the project expected budget, schedule, timeline, and other requirements...
Read MoreAnswer: Sydney Smart Office Design: Network Design Figure 1: Network design of the Sydney Office (Source: Created by Author) This is the main network design for the Sydney office. This office consists of many IoT device. For implementing the network one DHCP server, one remote server for IoT service, one wireless router for transmitting the network, one cable modem for connecting the router with the cloud is used. DHCP server DH...
Read MoreAnswer: Project name: Implementation of SAP S/4HANA for SAP Business All-in-one Purpose of the project charter The main aim of the charter is to provide the preliminary delineation of the roles and the responsibilities of the project team along with the objectives of the project. The charter aims in evaluating the objectives of the project, project requirements and deliverables of the project. The charter will provide an idea of the sche...
Read MoreAnswer: Introduction The organization of Headspace is one of the most popular and significant medical organizations in New South Wales that treat mental patients. They have noticed that the young people, who have age difference within 18 to 25, are the major victims of mental illness, depression and many others. They require regular treatment due to this type of problems. However, whenever they are being asked about their problems repeatedly,...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
very good, i don't have to say . ;-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------...
Australia
Thank you so much! it helpful to pull my grade up. I wouldn't be known without these my grade will be fail with the essay but with these sure save my grade !!
Australia
I got 82% on my assignment however, my subject was quite difficult for many people; therefore I\'m satisfied with the associate that did my work ! I would definitely continue to use this platform.
Australia
I got 80% on my assignment however, my subject was quite difficult for many people; therefore I\'m satisfied with the associate that did my work ! I would definitely continue to use this platform.
Australia