Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Can you answer the final presentation with what and exactly should i put in the slides using the information I attached below. Thank you for

image text in transcribed

Can you answer the final presentation with what and exactly should i put in the slides using the information I attached below. Thank you for the help :)

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed Final Assignment: Presentation on Report to Taylor Smith Summary of the Assignment: - Task: In this assignment, you will prepare a PowerPoint presentation, with audio, to the IT team and Taylor Smith as a follow-up to your report to Ms. Smith. - Length: Your presentation will comprise 5-8 slides and be 4-7 minutes in length. - Graphics: You must include at least three graphics. Brief Description and Strategies to Follow: You have written a report to Taylor Smith about the concerns you have about Forrest Order Services. Ms. Smith has now asked you to give a brief summary of your report as a presentation to her and the IT team. You will prepare a PowerPoint presentation of 5-8 slides for Ms. Smith and the members of her IT team that summarizes the problem and solution presented in your report to Ms. Smith. You will record the presentation by integrating audio into the PowerPoint and posting the PowerPoint file to the assignment folder. You may post the presentation to the web and provide a link to the presentation, if you would prefer that approach. I hope this memo finds you well. As the newly appointed Manager for Customer Service at Forrest Order Services, I would like to bring your attention to some pressing issues regarding the company's IT infrastructure and security practices. The rapid growth of the company has exposed vulnerabilities that could potentially impact our operations and compromise the privacy and satisfaction of our valued customers. Executive Summary: This report addresses the IT and security concerns at Forrest Order Services. The current IT setup poses challenges such as limited database access, single-person control of website management, sole maintainer of the company blog, and exclusive access to payroll records. These issues not only hinder operational efficiency but also increase the risk of data misuse and compromise. To mitigate these concerns, the report proposes implementing solutions such as multi-user database access, granting additional employees access to manage the website and blog, and diversifying access to payroll records. These measures aim to enhance operational continuity, improve data security, and protect the company's reputation. Table of Contents: 1. Introduction 2. The Problem 3. Suggested Solution 3.1 Database Access and Security 3.2 Website Management 3.3Blog Maintenance 3.4 Payroll Records 4. Conclusion 5. References The Problem: The current IT setup at Forrest Order Services poses several challenges that require immediate attention. These challenges include limited database access, single-person control of website management, sole maintainer of the company blog, and exclusive access to payroll records. If any of the key individuals responsible for these tasks were to experience an emergency or leave the company, it would significantly disrupt our operations and compromise our ability to provide efficient customer service. Furthermore, the current arrangement leaves us vulnerable to cybersecurity risks. With only a few individuals having privileged access to critical IT functions, the potential for data misuse or compromise increases. In the event that personal customer data falls into the wrong hands, it could lead to severe legal and reputational consequences for Forrest Order Services. Suggested Solution: To address these concerns and ensure the continuity of our operations, I propose the following solutions: 1. Database Access and Security: a. Implement a multi-user access system to the database, allowing multiple authorized employees to manage client records. b. Conduct training sessions to educate employees about data security best practices and ensure compliance with industry standards. 2. Website Management: a. Grant access to additional employees who can update and manage the website, ensuring continuity and preventing disruptions in case the current responsible individual is unavailable. b. Consider centralizing website management under the IT Department's supervision to enhance security and streamline maintenance efforts. 3. Blog Maintenance: a. Provide training to other team members who can contribute to blog updates, ensuring that multiple individuals possess the necessary skills to maintain and update it regularly. b. Establish a protocol for documenting blog-related processes to facilitate seamless knowledge transfer between employees. 4. Payroll Records: a. Implement a system that allows authorized individuals from the HR or Finance departments to access payroll records and process payments when the current responsible individual is unavailable. b. Explore the possibility of diversifying access to payroll information by utilizing secure cloud-based solutions that allow controlled access to authorized personnel. The History of Forrest Order Services Some history on the company will help to explain the problems Forrest Order has now. Forrest Order started off in 2009 as a small outfit, owned and operated by Taylor Smith. Taylor grew up in Prince George's County, Maryland. She graduated from high school and took a few courses at a local community college. She never graduated from the community college but instead, after completing 21 credits, decided to leave school to start a landscaping business. Taylor started off the business with one truck, three lawn mowers, and a few helpers. She operated the business out of her house. Eventually, as the number of clients grew, so did the number of trucks, lawn mowers, and pieces of equipment. She added new employees to assist with the landscaping. Taylor eventually leased office space in Landover in order to have a more professional and scalable base from which to operate the company. In addition, as the company grew and its office staff grew, so did the technology and IT needs. For the IT needs of the company, Taylor took several steps. She hired a web developer, Sammie Davidson, to develop a website for Forrest Order. Sammie used WordPress as the platform. Taylor later hired George Johnson to develop and maintain a database of customers, past and present. The database includes personal information on the customers, such as physical addresses, email addresses, and, for some, credit card information. Eventually, Taylor hired a few more IT employees, all of whom persuaded Taylor to put the company's database on the cloud instead of purchasing an expensive server to maintain in the office. Taylor agreed. The company then contracted with SecureCloud, a local cloud company. The IT Department grew as the company grew. Mark Nelson was later hired. He maintains the company blog, also on WordPress, but with a different account from that of the website. The blog is an effective marketing tool. It provides weekly updates on services, deals, and other information on the company. In addition, other functions began to involve IT. Jane Stone was hired to run payroll for Forrest Order. With Jane's input, the payroll information was put on the cloud. SecureCloud maintains all payroll information on its servers. Problems That Have Developed Taylor, in hiring the IT staff and organizing the department, was not privy to best practices in security in the area of IT. As a result, some problems have developed. For example, only George has access to the database of past and present clients. George logs into the system with an ID and password that SecureCloud has provided him. This is not an ideal situation. If George were to experience a medical emergency and become unavailable for a period of time, no one else at Forrest Order Services would have access to the database. If George were to leave the company, no one else at Forrest Order Services would be able to perform his duties. In addition, SecureCloud has a company policy that forbids it to provide login or password information to anyone other than approved individuals. The only approved individual now is George. Morever, Sammie maintains the website through WordPress. She uses her personal email and password to log into the system. But she is the only individual in the office who has access to or is able to update anything on the website. Again, if anything were to happen to Sammie, Forrest Order would be stuck. No one else in the company can update its website. Mark manages the company's blog, also on WordPress. The blog is an excellent marketing tool, with weekly updates on services, deals, and other information on the company posted weekly. However, Mark is the sole maintainer of the blog. No one else at Forrest Order has access to the blog to update it. Jane runs payroll. Like the others, she is the only individual with any access to the payroll records. Because the records are also on SecureCloud, if something were to happen to Jane, no options are available for anyone else in the company to access the payroll records. Overall, Forrest Order grew at a rapid pace. Taylor Smith applied excellent management skills in growing the landscaping business. However, Taylor needs help in establishing responsible IT personnel policies for the company. Taylor has no background in this area. Taylor is not aware of the problem the current arrangement poses. Your Concern About the Situation As a new hire at Forrest Order, you have observed this situation, and you are concerned. The current arrangement leaves the company in a very vulnerable situation if one of these individuals experiences a medical emergency or has to leave the company for any reason. In addition, the current arrangement poses a cybersecurity danger to the company. Any one individual, if he or she is dissatisfied with the company or becomes disgruntled for any reason, can take advantage of Forrest Order and do great damage with the IT function the individual controls. For example, personal data on customers resides with SecureCloud's servers, which only George Johnson can access. If George were to develop a toxic relationship with the company, George could use his sole access to customer records and wreak havoc with them, possibly manipulating the company with his control or simply compromising the privacy of the customers. Forrest Order, not George, would be liable in such a situation. As Manager for Customer Service, you realize that many of the potential problems that could arise at Forrest Order will have an impact on your area. Customers will not have records updated, will not be billed on time, will not receive blog updates, and will be impacted in other ways if any of the situations described above occur. Moreover, if customers' records are compromised, you will have a customer service crisis on your hands

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Ethics for the Information Age

Authors: Michael J. Quinn

7th edition

134296540, 9780134296623 , 978-0134296548

More Books

Students also viewed these General Management questions