Please enable JavaScript.
Coggle requires JavaScript to display documents.
PART 3: SIGNIFICANT CHALLENGES AND POSSIBLE THREATS OF IT - Coggle Diagram
PART 3: SIGNIFICANT CHALLENGES AND POSSIBLE THREATS OF IT
Challenges of IT: Customer Services
Challenge: To improve customer service by listening to and meeting the client's needs. Make customer service job number one.
IT suffers from a bad reputation when it comes to satisfying customer needs. Unfortunately, it is often well deserved.
Too many times, the work is done incorrectly or not to the customer's requirements — and it is the customer who ultimately determines what is good customer service and what is not.
Challenges of IT: Human Recources
Challenge: Develop creative ways to minimize stress, satisfy employee needs, and match corporate needs to employee goals.
Burnout is an ever increasing concern as budgets become tighter and workloads increase.
This might seem costly, but losing a valued employee due to burnout can be far more costly.
Challenges of IT: Productivity
Challenge: Make the best use of new technologies like cloud and mobile computing but search out additional ways to increase productivity.
First came the mainframes, then the minicomputers, PCs, and the Internet.
Some causes stress, eg; security & privacy for cloud computing need 24/7 monitoring.
Challenges of IT: Data Storage Retrieval
Challenge: Determine what data, if any, is susceptible to bit rot and transfer to new media before it becomes a problem.
Archiving data is very important for any IT companies since it can be considered as company properties.
In short-term, the problem of data needs is not obvious, but in a long-term, there might be some problem on retrieving data from older hardware and technologies.
Challenges of IT: Multinational Operations
Challenge: Instill a culture of teamwork among international team members with diverse backgrounds and varying ethnicities.
The global economy is upon us. It is increasingly common to find offices and data centers in countries halfway around the world. And with this transition come a number of challenges.
Travel, language, and time zone differences are all issues that must be addressed. But far and away the greatest challenge will likely be overcoming the cultural differences and changing the "us versus them" mindset.
Possible Threat of IT: Intellectual property theft and corporate espionage
Most IT security pros have to contend with the large group of malicious hackers that steal intellectual property from companies or perform straight-up corporate espionage.
Their method is to break into a company's IT assets, dump all the passwords, and over time, steal gigabytes of confidential information: patents, new product ideas, military secrets, financial information, business plans and so on.
They pass along valuable information to their customers for financial gain, and they stay hidden inside the compromised company's network for as long as possible.
Possible Threat of IT: Hacktivist
IT security pros have to contend with an increasing number of loose confederations of individuals dedicated to political activism, like the infamous Anonymous group.
Politically motivated hackers have existed since hacking was first born.
The big change is that more of it is being done in the open, and society is acknowledging it as an accepted form of political activism
Possible Threat of IT: The increasingly compromised web
At the most basic level, a website is simply a computer, just like a regular end-user workstation.
In turn, webmasters are end-users like everyone else.
It's not entirely a matter of webmasters' computers being exploited that's leading to the rise in web server compromises.
More often, attackers find a weakness or vulnerability in a website.
Possible Threat of IT: Malware mercenaries
No matter what the intent or group behind the cyber crime, someone has to make the malware.
In the past, a single programmer would make malware for his or her own use, or perhaps to sell.
Teams and companies dedicated solely to writing malware to bypass specific security defenses, attack specific customers, and accomplish specific objectives.
Possible Threat of IT: Botnets as a service
Botnets aren't just for their creators anymore.
Having more than likely bought the malware program that creates the bot, today's owners will either use the botnet for themselves or rent it to others by the hour or another metric.
The malware program attempts to exploit tens of thousands of computers to create a single botnet that will operate at the creator's instruction.