Saturday, October 19, 2019
Q1 - Using Knowledge & skills to Assess Usage of Web Technologies in Essay
Q1 - Using Knowledge & skills to Assess Usage of Web Technologies in Your organization - Essay Example This practice also assists organizations to trim down their operating expenses and thereby offer best quality products and services to consumers at affordable prices. Therefore, any flaw in the use of web technologies would raise potential challenges to the competitiveness of the organization, and this in turn may cause the firm to lose its market share to competitors. In this situation, it is necessary for every firm to maintain a multidisciplinary team capable of assessing the firmââ¬â¢s use of web technologies. Evidently, combined use of IT and management skills is inevitable to evaluate the use of web technologies in the organization effectively. Undoubtedly, improved IT skills are the most prioritized need when it comes to assessing the efficiency of the firmââ¬â¢s technological base. An organizationââ¬â¢s databases and network servers contain a wide range of customer data and information that are sensitive in nature. Hence, it is the duty of this team to ensure that sensitive customer data are secure at the best level and they are not exposed to growing security vulnerabilities. Presence of individuals with great IT skills in the team is vital to add advanced security features to the firmââ¬â¢s internal servers and networks, and this will reduce the threat of hacking and other malware attacks (Lemos, n.d.). In addition, it is also essential to identify security pitfalls in the firmââ¬â¢s databases and networks (if any) and resolve those issues immediately. Similarly, the combined use of IT and management skills is essential to make employees aware of the dreadful consequences of the data loss or theft, and enlighten them about improved data management practices. Reports indicate that inappropriate data management practices by employees is one of the major problems making sensitive customer/management data vulnerable to external security threats (Cisco, n.d.). The team charged with
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.