IT Proposal_2_Chloe Kalsi

docx

School

Harvard University *

*We aren’t endorsed by this school

Course

678678678

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

6

Uploaded by MinisterHarePerson674

Report
IT Explorations | Start IT Up! | Proposal PROPOSE IT! October 21, 2021 RE: Response for Services for MySocial Solutions Dear Joy, Thank you so much for your interest in upgrading your IT department at MySocial Services. I have provided an outline below to accomplish your requests in the most efficient way possible. OVERVIEW AND SUMMARY I’ve gathered information from various websites and will be discussing and comparing them in easy-to-read information sections outlined below. IT in Small Businesses When new technologies are released, they may not work well with older systems or applications. I see as your website was designed over 10 years ago; it is lacking web 3.0 functionality. Websites are advertising for your business, but they can also allow you to accomplish more tasks by incorporating Web 3.0 features. Without this, it can lead to data duplication, having to look for information in multiple places, and other complications. In small businesses, thorough planning prior to implementation can help minimize these issues. We will include strategic IT planning. IT and business leaders are frequently disconnected. Leaders see the big picture, but they don't always collaborate with IT to ensure they can achieve their objectives without being hampered by technology. IT in Large Businesses Currently, cloud deployment is the norm, not the exception. It is being used by all organizations in the IT industry to perform a wide range of tasks such as data backup, disaster recovery, email, virtual desktops, software 1
IT Explorations | Start IT Up! | Proposal development, and testing. Rather than owning or purchasing physical data centers and services, one can use a cloud provider to access services such as computing power, storage, and databases. However, there are several issues and concerns associated with cloud computing, such as cost, service provider reliability, downtime, data overload, password, security issues, and, most importantly, data privacy. Large businesses struggle with these issues, more than small businesses would. When small businesses have these issues, they may struggle with possible downtime whereas, larger businesses may face security and privacy issues. SUPPORTING WEBSITES AND CLOUD COMPUTING IT Profession Needed We can provide full time web maintenance to keep track of everything related to a website. Webmasters are important for both small and large businesses. They keep track on its search engine performance, usefulness, speed, and design. Webmasters maintain track of content, campaigns, and marketing activities as well. They are also in charge of the site's technical features, such as performance and capacity, which are measurements of a website's speed and capacity to handle traffic. They oversee the appearance and operation of the website or interface. Web Site Administration With our Web Design Team in house, we can develop, design, and code websites and web pages, many of which include text, audio, images, graphics, and video clips. We can oversee the design and layout of a website or online pages. It may also refer to creating a fresh new website or upgrading an existing one. While part time Web administrators design, develop, maintain and troubleshoot websites. We can above all else provide this solution for your company 24/7 and provide a secure and efficient user experience. I also recommend implementing security procedures, changing programs, generating backups, addressing software problems, upgrading material, and other tasks may fall under this category. 2
IT Explorations | Start IT Up! | Proposal SaaS and Cloud Support Our SAAS Cloud computing service has some good factors when it comes to large and small businesses. For small businesses cloud computing could be a problem in terms of downtime for them. Cloud computing makes small businesses rely on the reliability on the internet connection. Meaning when it goes offline you go offline. However, for your size of business it has some good benefits such as reliable disaster recovery and backup solutions. On the other hand, large businesses may face security issues. This could be a potential problem because of the lack of resources/expertise. Another issue is you are unable to see the exact location where your data is being stored or processed. But the good outweighs the bad in the case of your company. We can ensure the best reliability rate at 99.9% uptime and least down time for your business operations. SECURITY RISKS AND LEGAL IT-Related Security Risks Let’s discuss security and malware attacks. If you have not experienced this, its great news, but I do recommend you plan for this in advance to make sure you keep the trust of your customers in the future. What is a malware attack? A malware attack is a type of cyberattack in which malware (usually malicious software) performs unau theorized actions on the victim's system. We can train your employees about how to avoid malware attacks by training users to not download and run unknown software. Training is included with our service. Cyber security helps prevent malware attacks and protects systems from cyber-attacks. Cyber security is a must when it comes to small and large businesses alike and decreases the chances of cyber-attacks. Having cyber security means you do not have to worry later because this security hole is already plugged up in advance. If something should happen, we can have protocols in place to quickly rectify the situation and get your business 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
IT Explorations | Start IT Up! | Proposal back up and running, minimally compromised. We will protect your organization against illegal access of systems, networks, and technologies. Legal Concerns with IT I’m sure your legal team already knows that unauthorized access to private data is prohibited. Inappropriate data usage Accuracy and completeness while using technology to acquire data on a person or individuals (corporations included). The availability of data content, as well as the legal right of the data subject to access it; ownership. This can pose a threat to small and large businesses in attempts of copyright. Without digital ownership things can be easily copied online. Legal concepts like copyright have struggles to keep up with the digital age. With digital ownership we have the authority to access and/or use data, information, and knowledge about ourselves or the objects we own. We provide software which will provide 27/7 monitoring of your corporate identity and online assets. DEEP DIVE INTO IT ISSUE Description of IT Issue Unauthorized access occurs when someone gets access to a website, program, server, service, or other system using another person's account or other means. Unauthorized access occurs when someone repeatedly guesses a password or username for an account that is not theirs until they gain access. Description of IT Profession Responsible for the Issue We can instantly deploy Cyber Security Specialists for resolving any issue as they may arise. Cybersecurity specialists work to ensure the security of networks and data. One of the primary responsibilities of a cybersecurity specialist is to monitor an organization's systems and report any issues to planning. This is included with our service. 4
IT Explorations | Start IT Up! | Proposal Relevance of IT Issue to Business Practices Employee records, customer details, loyalty schemes, transactions, and data collection are all examples of key pieces of information that businesses commonly store. This is done to keep that data from being used for fraud by third parties, such as fake websites and identity theft. Unauthorized access to private data is a big issue. Unauthorized access to private data poses a threat to both small and large businesses. It not only is illegal but is a huge risk. Some ways this might put small and large businesses at risk is exploitation. We can implement a program with high security protocols to ensure unauthorized access by users will be blocked and provide security chains to prevent anyone having full access without supervision for better controls and layered security. Proposed Solution I noticed your website is currently lacking major security features. I propose we patch and fix vulnerabilities in software, operating systems, drivers, and other systems that attackers might use to get access to your device and data. We can prevent users from obtaining unwanted access to the system by using latest security patches, create a better cloud based SAAS solution for managing your internal processes and backup. I also recommend using the latest malware and cybersecurity software and linking your websites which are open facing with a strong and secure back-end network. Foreseeable Problems with Solution We encourage you to act quickly and without delay. As you are growing your business, being an online business in the Social Media and Marketing Space, I recommend implementing my proposal immediately. We are elastic. As your company grows, we can upgrade and increase services. 5
IT Explorations | Start IT Up! | Proposal CONCLUSION Now that I have walked you through the entire scope of what our company can provide your company, I hope you will understand the need and the depth of the solution we can provide your organization. We can complete the entire scope of your project within 3 months for $150,000. I hope to earn your business and be an invaluable asset to your company’s future. Best Regards, CHLOE KALSI, HEAD OF IT 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help