Investigation
Scope
What activities does the business undertake?
The business undertake “insurance business”. The business covers insurance of various things. The things that it covers is Money Insurance, Fire Insurance, Golf Guard, Project Insurance, Personal Accident, Domestic Helper, Burglary, Houseowner Insurance, Family Guard, Motor Insurance, Hole-In-One Insurance, Retail Guard, Contractor’s All Risk, Food and Beverage Guard, Public Liability, Professional Indemnity, Goods in Transit, Marine Cargo Insurance, Workmen Compensation, Employ Guard.
Size of Business?
This business consist of 1 Head Office, 4 branches and 2 Counter
• The Head Office
The Head office is located in Kiarong/Kiulap. The address is at Unit No. A11, Block A, Bgn.
…show more content…
Mobile Phones are not used in the company, it is suggested for the company to use a mobile on the up to date software so if the staff can check info and emails while on the go example is when the staff is working outside as a backup device where is needed.
Security software is quite good but the problem lies to the older OS used in the company as most security software will need newer OS as older OS will be outdated and no security parch will be given also by Microsoft. Such OS is the Microsoft Windows XP SP3 being used on few PC’s.
The security for this company is quite unsatisfactory this is because only the main office in kiarong have a security while other branches have no security only locks. The main office uses a Digital Electronic/Code Keyless Keypad Security Entry Door Lock and a cctv system. What can be improve is the other branch should also include a Digital Electronic/Code Keyless Keypad Security Entry Door Lock and a cctv system. Because if the company do not do this an incident might happen and the branches will be
Mobile phones have improved a lot since it was first introduced and now nearly everyone owns a mobile phone. It keeps you connected with friends, family and co-workers. This is very good in case of an emergency you can quickly contact someone for help and keeps you safe. A mobile phone is packed with so much technology such as a music player, digital camera and even a GPS.
The insurance industry’s performance is highly correlated with the state of the economy and specifically GDP growth. From the data outlined in this report, it is evident that the insurance industry flourishes alongside the economy where factors such as output, unemployment, and other variables are growing as well. Since the 2008 crisis, the Canadian economy has recovered quite well. One of the key concerns going forward is the current exchange rate of the Canadian dollar. Going forward, as the economy goes into a boom it will be crucial for the insurance industry to reach its potential.
As Figure 2 displays, companies are already taking measures to implement security controls for the security risks mentioned above. As daunting as the security risks mentioned before may seem they can be managed and controlled effectively. Although, implementing these security controls will take time and is costly for companies to do.
business of insurance. But the lack of uniformity, loop holes, blind spots and deficiencies within
Any enterprise has to pay special attention to computer security. Computer security is a field that is concerned with the control of risks related to computer use. A primary focus should be on the external threats to the computing environment. In enterprise with branches cross country, it is important to allow information from "trusted" external sources, and disallow intrusion from anonymous or non-trusted sources. In a secure system, the authorized users of that system are still
List the information required for each section. Blank 1: Type of Insurance Blank 1a: Insured's ID number Blank 2: Patient first name and last name Blank 3: Patient’s sex and DOB Blank 4: Name of the person that’s Insured Blank 5: Patient's Address Blank 6: Patients relationship to the insured person Blank 7: Insured's address Blank 8: Patient status Blank 9: Other Insured's Name *completed if there is an additional healthcare plan* Blank 9a: Other Insured's Policy or group number Blank 9b: Other Insured's DOB/ Sex Blank 9c: Insured's Employer or School Name Blank 9d: Insurance Plan or Program Name Blank 10a-c: Is patient's condition “related to" Blank 10d: Reserved for Local Use
“Security programs are aimed at creating an appreciation and understanding of the Security Department’s objectives as they relate to the specific industry they serve” (Sennewald, 2013). Businesses come in all different sizes, some big some small. Businesses need a plan to ensure assets, personnel, and facilities are protected and this plan must be actively in place. Security programs provide businesses with the framework needed to keep a business or company at the security level needed to operate. This can be done in numerous ways. Assessing the risks involved, lessening the gravity of those risks, and keeping the security program and the security practices updated are just to name a few. In this core assessment paper, I will identify an actual organizational security program, conduct
Mobile computing is the important information system infrastructure. Organization information system mainly get very good benefits from the Mobile computing. From work place and the normal can interact with Mobile computer is made possible by portable computer hardware, software, communication systems that a non-mobile organization information system. The accessibility, improves information quality, enhance management effectiveness all this potentially strategic technology is getting from Mobile computing. I am presenting the detail analysis, by using elucidate and support these asserted benefits of Mobile computing in the organizations. In additionally, a set of MOBILE framework information developed. I am explaining the benefits like defining the types of problems, opportunities and directives of Mobile computing. I am explaining History and efficiency of mobile computing. And I am explaining its business implications.
Some of the items that will need to be made aware of and shared with executives, employee and the stakeholders of the organization is the managing and protection of Access Control and attack monitoring system, each and every member of the company will need to understand and abide by the policies that govern access control in the workplace, allowing other employees to enter a facility without each employee scanning their badges will be a breach of security. The awareness of securing network architecture and network communications components, raise awareness on security governance concepts and policies and risk and personal management. The support of the entire organization in the changes and improvement will results in an effective strategic
12-22-16 recd. a call from a lady who did not want to say who she was nor provide a call back #. She wanted to verify Mr. Pankopf's Liability Insurance. Once I provided his 2016 information since his 2017 was not entered as of yet she referred to the rule and claimed he did have insurance and did not report it to us and we should fine him. I explained she would need to speak to OBC because I do not handle complaints. I tried to transfer the call to Rose with no answer. I asked if she would like to leave a mesg for Rose she said no and asked who else she could talk to. I told her OBC is the only dept. She would need to call bk and she said she would. Told Vanessa so she was aware to send the call to OBC.
Conclusion of Research: Through an actual study, we scrutinized the features of information security in an organization with best practices. And from this paper we explored about successful security development programs that highlight the security policies and understanding the current scenario of organization to targeted ratio.
Mobile phones: Is wireless device that allows users to make calls, send text messages and send emails (with the smartphones). As JKJ, it is a state agent mobile phone is needed to be in touch with their customers and colleagues from outside the offices, such as calling the customers from the properties they need to rent or sell.
Employee interaction on all devices are relatively the same and have similar impact on all systems. Some companies are allowing you to bring your own device (BYOD) to work for an enhanced work experience and increased productivity. Some of the benefits from this are no tracking of daily productivity, the comfortability of having your own device, and lower costs to maintain company property. Depending on the size of your company BYOD could be extremely beneficial and allow the employees to take on much of the burden of debt to work at the company. The average mobile device cost approximately three hundred dollars and if you have anywhere from 10 to 20 employees that could raise the cost to about 500 dollars. Apple and windows users tend to be more familiar with their devices so it is easier to manipulate their business requirements as they need. Lastly, having the flexibility to utilize one device vice several saves a lot of discomfort whether on business or official travel. The ability to have your own dedicated
Cell phones have become more and more popular in the United States as years have gone by. They are now nothing like how they were years ago. Since cellular devices have evolved employees have become able to do increasingly more jobs on the phones. For example, during work employees are now able to check social media, listen to music, take quality photos, and play games all on a small mobile device. Because of the evolution of the phone, employees have certainly become less effective. Cell phone usage has disturbed the work place because it decreases productivity, endangers employees, and lowers quality of work.
In the next five years, increased interest rates and increased investment in new activities will promote the vehicle insurance industrial.