quicker communication and collaboration for faster and enhanced decisions. These advantages enable members of the corporation to conduct business anytime, anywhere it requires and still having access to the company’s resource (Sheldon, 2019). For example, a sales representative can update the information of the customers even though the agent in on sales call, instead of
RUNNING BUSINESS WITH INFORMATION TECHNOLOGY10making notes and updating the information when time permits. This tremendously save efforts and time and the same talking, also reduces errors resulting from repetitive process. Another benefit of mobile infrastructure is it offers the capability for streamline communications. Members of organization are readily available to quickly review time constricted materials, collaborate in social networking, staying connected and maintaining communications. This portability and flexibility enable members of organization to better serve customers. In instance, a field support technician is only a call away or more responsive when customers require assistance, be it through text, call, instant messaging, or email. Agents are alsoable to share data or information, interact with customers in real-time.The HR department can also enjoy the benefit from their workers utilizing mobile device.The human resource department could create an app that enable employee’s plethora of ways to submit time card, fill-out reports, confirm training schedules, and sending and receiving any announcements (Sheldon, 2019). Unfortunately, this infrastructure solution also has disadvantages to the business practices. According to Sheldon, 2019, mobile gadgets are not exempt from many vulnerabilitiessimilar with personal computers. Cybercriminals and hackers are capable of intercepting cellularand unsecured Wi-Fi translations, which is a major concern. Mobile users could also inadvertently visit unwanted sites or reply to phishing emails, unknowingly download malwares that could compromise the mobile device, corporate network and resources. Mobile applicationsthat are deployed without going through proper testing for security could compromise the entire organization’s network and put at risk. Ignored vulnerabilities on mobile infrastructure or ignoring to apply patches on the company’s operating system in a reasonable time could result in
RUNNING BUSINESS WITH INFORMATION TECHNOLOGY11compromised network. Poorly managed security policies ill employed back end system could also possess risk to the organizations.Additionally, IT teams must make sure employing the device does not outcome in violation of standards and regulations such as health insurance portability and accountability act (HIPPA). It must deliberately consider the carrier that provides the service plans to implementing mobile service. Some service plans limit the amount of used data, text or calls.