Haggar_MMT2_Task1.docx - Samantha Haggar MMT2 Task One A1...

This preview shows page 1 - 3 out of 13 pages.

Samantha HaggarMMT2 Task OneA1 - Utilizing SWOT Analysis to Evaluate the Existing IT InfrastructureStrengthsThe case study provides a substantial amount of beneficial information to make conclusions about the existing IT infrastructure of AEnergy. The following data were categorizedas strengths of the company: Backups to Offsite Locations – Backing up the information to an offsite location protects all of the company’s data in a few ways. If there was ever a fire or any sort of natural disasterat the main office, their backup data servers will be safe and can reduce the amount of loss the company goes through and ensures customer data is safe and secure. IT employees know where the servers are held and can be confident that the data is protected. Site Interconnectivity – The network interconnectivity allows people in all office locations to work as if they were together in one location. This allows for easy data transfer, communication and for work to be done effectively and efficiently. With the interconnectivity, it is all managed through one central location and helps employees collaborate as if they were in that central location. This also makes it easier for people who travel to hop on and work at any location they need to and still get their job done as if they were in office. Experience IT Department – The biggest strength the current IT infrastructure as is the experienced staff who work in the IT department and are responsible for overseeing it. Everyone that is a part of this team is highly experienced in many areas of IT such as management, security, databases, analytics, problem-solving, programming, safety, server management, energy efficiency, website development, training, and technical assistance. Thisis essential to be able to expand the company.
Samantha HaggarMMT2 Task OneA2 - WeaknessesIn any company or plan there are weaknesses and areas to improve on. AEnergy is no different. The case study shows many strengths but there are also many areas to expand on and develop before growing the company into more states. WPA Encryption and MAC Address Filtering – Although these are important steps to takewhen creating wireless security, these two options are not the best to rely on. It does ensure that you must be authorized to access the wireless network, but this is an easy wayfor information to get attacked and breached. Where the company is planning to grow theIT infrastructure must grow with it. Therefore, the network is being opened up to more opportunities of becoming hacked or corrupted and causing serious damage to the company’s workflow. Personal Employee Backups – It is great to backup everyone’s data to ensure nothing getslost, but this requires a lot of data to be backed up that may not be necessary. With a growing company and an expanding one, this means more employees and more information to backup. Looking into alternative ways to conserve data and server space will help tremendously by saving money, time and resources.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture