IT Proposal_2_Chloe Kalsi
docx
keyboard_arrow_up
School
Harvard University *
*We aren’t endorsed by this school
Course
678678678
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
6
Uploaded by MinisterHarePerson674
IT Explorations | Start IT Up! | Proposal
PROPOSE IT!
October 21, 2021
RE: Response for Services for MySocial Solutions
Dear Joy,
Thank you so much for your interest in upgrading your IT department at
MySocial Services. I have provided an outline below to accomplish your
requests in the most efficient way possible.
OVERVIEW AND SUMMARY
I’ve gathered information from various websites and will be discussing and
comparing them in easy-to-read information sections outlined below.
IT in Small Businesses
When new technologies are released, they may not work well with older
systems or applications. I see as your website was designed over 10 years
ago; it is lacking web 3.0 functionality. Websites are advertising for your
business, but they can also allow you to accomplish more tasks by
incorporating Web 3.0 features. Without this, it can lead to data duplication,
having to look for information in multiple places, and other complications. In
small businesses, thorough planning prior to implementation can help
minimize these issues. We will include strategic IT planning. IT and
business leaders are frequently disconnected. Leaders see the big picture,
but they don't always collaborate with IT to ensure they can achieve their
objectives without being hampered by technology.
IT in Large Businesses
Currently, cloud deployment is the norm, not the exception. It is being used
by all organizations in the IT industry to perform a wide range of tasks such
as data backup, disaster recovery, email, virtual desktops, software
1
IT Explorations | Start IT Up! | Proposal
development, and testing. Rather than owning or purchasing physical data
centers and services, one can use a cloud provider to access services such
as computing power, storage, and databases. However, there are several
issues and concerns associated with cloud computing, such as cost,
service provider reliability, downtime, data overload, password, security
issues, and, most importantly, data privacy. Large businesses struggle with
these issues, more than small businesses would. When small businesses
have these issues, they may struggle with possible downtime whereas,
larger businesses may face security and privacy issues.
SUPPORTING WEBSITES AND CLOUD COMPUTING
IT Profession Needed
We can provide full time web maintenance to keep track of everything
related to a website. Webmasters are important for both small and large
businesses. They keep track on its search engine performance, usefulness,
speed, and design. Webmasters maintain track of content, campaigns, and
marketing activities as well. They are also in charge of the site's technical
features, such as performance and capacity, which are measurements of a
website's speed and capacity to handle traffic. They oversee the
appearance and operation of the website or interface.
Web Site Administration
With our Web Design Team in house, we can develop, design, and code
websites and web pages, many of which include text, audio, images,
graphics, and video clips.
We can oversee the design and layout of a
website or online pages. It may also refer to creating a fresh new website
or upgrading an existing one. While part time
Web administrators
design,
develop, maintain and troubleshoot websites.
We can above all else
provide this solution for your company 24/7 and provide a secure and
efficient user experience.
I also recommend implementing security
procedures, changing programs, generating backups, addressing software
problems, upgrading material, and other tasks may fall under this category.
2
IT Explorations | Start IT Up! | Proposal
SaaS and Cloud Support
Our SAAS Cloud computing service has some good factors when it comes
to large and small businesses. For small businesses cloud computing could
be a problem in terms of downtime for them. Cloud computing makes small
businesses rely on the reliability on the internet connection. Meaning when
it goes offline you go offline. However, for your size of business it has some
good benefits such as reliable disaster recovery and backup solutions. On
the other hand, large businesses may face security issues. This could be a
potential problem because of the lack of resources/expertise. Another issue
is you are unable to see the exact location where your data is being stored
or processed. But the good outweighs the bad in the case of your company.
We can ensure the best reliability rate at 99.9% uptime and least down time
for your business operations.
SECURITY RISKS AND LEGAL
IT-Related Security Risks
Let’s discuss security and malware attacks. If you have not experienced
this, its great news, but I do recommend you plan for this in advance to
make sure you keep the trust of your customers in the future. What is a
malware attack? A malware attack is a type of cyberattack in which
malware (usually malicious software) performs unau theorized actions on
the victim's system. We can train your employees about how to avoid
malware attacks by training users to not download and run unknown
software. Training is included with our service.
Cyber security helps prevent malware attacks and protects systems from
cyber-attacks. Cyber security is a must when it comes to small and large
businesses alike and decreases the chances of cyber-attacks. Having
cyber security means you do not have to worry later because this security
hole is already plugged up in advance. If something should happen, we can
have protocols in place to quickly rectify the situation and get your business
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
IT Explorations | Start IT Up! | Proposal
back up and running, minimally compromised. We will protect your
organization against illegal access of systems, networks, and technologies.
Legal Concerns with IT
I’m sure your legal team already knows that unauthorized access to private
data is prohibited. Inappropriate data usage Accuracy and completeness
while using technology to acquire data on a person or individuals
(corporations included). The availability of data content, as well as the legal
right of the data subject to access it; ownership. This can pose a threat to
small and large businesses in attempts of copyright. Without digital
ownership things can be easily copied online. Legal concepts like copyright
have struggles to keep up with the digital age. With digital ownership we
have the authority to access and/or use data, information, and knowledge
about ourselves or the objects we own. We provide software which will
provide 27/7 monitoring of your corporate identity and online assets.
DEEP DIVE INTO IT ISSUE
Description of IT Issue
Unauthorized access occurs when someone gets access to a website,
program, server, service, or other system using another person's account
or other means. Unauthorized access occurs when someone repeatedly
guesses a password or username for an account that is not theirs until they
gain access.
Description of IT Profession Responsible for the Issue
We can instantly deploy Cyber Security Specialists for resolving any issue
as they may arise. Cybersecurity specialists work to ensure the security of
networks and data. One of the primary responsibilities of a cybersecurity
specialist is to monitor an organization's systems and report any issues to
planning. This is included with our service.
4
IT Explorations | Start IT Up! | Proposal
Relevance of IT Issue to Business Practices
Employee records, customer details, loyalty schemes, transactions, and
data collection are all examples of key pieces of information that
businesses commonly store. This is done to keep that data from being
used for fraud by third parties, such as fake websites and identity theft.
Unauthorized access to private data is a big issue. Unauthorized access to
private data poses a threat to both small and large businesses. It not only is
illegal but is a huge risk. Some ways this might put small and large
businesses at risk is exploitation. We can implement a program with high
security protocols to ensure unauthorized access by users will be blocked
and provide security chains to prevent anyone having full access without
supervision for better controls and layered security.
Proposed Solution
I noticed your website is currently lacking major security features. I propose
we patch and fix vulnerabilities in software, operating systems, drivers, and
other systems that attackers might use to get access to your device and
data. We can prevent users from obtaining unwanted access to the system
by using latest security patches, create a better cloud based SAAS solution
for managing your internal processes and backup. I also recommend using
the latest malware and cybersecurity software and linking your websites
which are open facing with a strong and secure back-end network.
Foreseeable Problems with Solution
We encourage you to act quickly and without delay. As you are growing
your business, being an online business in the Social Media and Marketing
Space, I recommend implementing my proposal immediately. We are
elastic. As your company grows, we can upgrade and increase services.
5
IT Explorations | Start IT Up! | Proposal
CONCLUSION
Now that I have walked you through the entire scope of what our company
can provide your company, I hope you will understand the need and the
depth of the solution we can provide your organization.
We can complete the entire scope of your project within 3 months for
$150,000. I hope to earn your business and be an invaluable asset to your
company’s future.
Best Regards,
CHLOE KALSI, HEAD OF IT
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help