Writing Assignment #4 (2)
.docx
keyboard_arrow_up
School
University of Maryland Global Campus (UMGC) *
*We aren’t endorsed by this school
Course
393
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by BookWorm1320
Abreu 1
Assignment #4
UMGC – WRTG 393
Bernardo J. Abreu
Nov 24, 2023
Memo to Maria Carman
Subject: Operational Concerns and Security Measures
Dear Maria Carman,
In my capacity as the recently appointed Assistant Manager, I've meticulously examined our
operations, uncovering noteworthy areas that warrant careful consideration. Enclosed in this
report are the highlighted concerns, accompanied by proposed solutions designed to fortify the
ongoing success of All Washed Up. Your thoughtful consideration and guidance in implementing
these enhancements would be immensely valued.
Best regards,
Bernardo J. Abreu
Assistant Manager, All Washed Up
Abreu 2
Executive Summary
Although our operational methods have been successful, they harbor latent risks to both
customer information security and business continuity. The issues identified include the
management of credit cards, shared computer practices, and the exclusive dependence on a
single employee for website management. To address these concerns, proposed solutions
encompass the refinement of credit card handling procedures, the establishment of policies for
shared computers, cross-training employees for website management, and the initiation of
comprehensive cybersecurity training. These strategic measures are designed not only to tighten
security but also to elevate operational efficiency, safeguarding against potential crises.
Problem Overview:
Credit Card Handling:
Manual Transportation:
The existing procedure involves manually transporting
numerous credit cards to the cashier's counter.
Risk of Theft:
This outdated method exposes the organization to a significant risk of
credit card theft.
Financial Fraud Risk:
The insecurity in handling sensitive financial information puts
both the organization and its customers at risk of financial fraud.
Shared Use of Computers:
Unchanged Passwords:
Within waiting areas, shared computers persistently use
unchanged passwords.
Security Vulnerabilities:
The absence of robust security measures on these shared
computers creates vulnerabilities.
Potential Breaches:
These vulnerabilities pose a risk of potential breaches in customer
information, compromising data integrity and confidentiality.
Website Management Dependency:
Sole Dependence:
The organization relies solely on a single employee for website
management.
Business Continuity Concerns:
This dependence raises serious concerns about business
continuity in the event of the employee's absence or departure.
Impact on Online Presence:
Risks of disruptions in website management could impact on
the organization's online presence and customer interactions adversely.
The convergence of these challenges paints a comprehensive picture of the organization's
susceptibility to security breaches and operational disruptions. The need for a strategic overhaul
in credit card handling, shared computer practices, and website management becomes evident to
mitigate these risks effectively.
Suggested Solutions:
To address these pressing issues, a multifaceted approach is recommended. Firstly, for credit card
handling, the implementation of secure card readers at cleaning stations is proposed.
Abreu 3
Figure 1: Secured Card Readers
Suggested Solutions:
Revised Credit Card Handling:
Secure Card Readers:
Implement secure card readers at cleaning stations.
Enhanced Security:
This enhances the security of credit card transactions.
Streamlined Process:
Simultaneously, it streamlines the payment process, reducing
manual handling of sensitive financial data.
Policies for Shared Computers:
Clear Policies:
Establish and enforce clear policies and procedures for shared computers.
Regular Updates:
Include regular password updates as a key component of these policies.
Robust Antivirus Measures:
Incorporate robust antivirus measures to significantly reduce
vulnerabilities associated with shared computer usage.
Cross-Training for Website Management:
Mitigating Dependence:
Cross-train employees in website management.
Continuity Assurance:
This ensures continuity by having multiple individuals proficient
in this critical role.
Periodic Backups:
Introduce periodic backups to fortify the organization against
disruptions.
Employee Cybersecurity Training:
Comprehensive Training:
Initiate comprehensive cybersecurity training for all
employees.
Device Handling:
Cover proper handling of electronic devices in the training.
Ch
arging Station Implementation: Implement designated charging stations to minimize
risks associated with employee practices.
Cultural Emphasis: Foster a culture of security through comprehensive training.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help