Introduction
In the day-to-day running of its activities, Ezyject a flight operations company, has expanded its business framework to regional and partnering companies like Rex and Tiger. Due to this expansion, a lot of work is needed to keep the operations flowing, however some problems have been encountered that portrays a negative setback to the achievement of company’s objectives. It is therefore felt that there is a need for a proper change in the way operations are run
Problems faced by IT department
The IT department is the major department that ensures all operations are run adequately in the organization. Booking of flights and other transactions are done by use of information systems. Understaffing is one big problem that this department faces. Inadequate number of personnel leads to slowdown in carrying out duties. Due to this problem a lot of work is not completed on time. Poor trained staff is also an issue. There is a problem of deciphering feedback from clients because most of the staff members lack proper understanding of the same. In some cases data entry take too long to be done and sometimes not done properly. The problem of data backup and virus protection of the computing systems is also faced (Salomon, & Cassat, 2003). There are no adequate mechanisms put in place to protect the systems from attack from malwares. Upgrade of systems has not been done for a long time as no clear time line is provided by the staff shoeing when last it was done.
Security mechanisms have not been implemented effectively in the department. Everyone can gain access in to IT resources and download or install any software or application of his/her own choice. This congests the network so much leading to slow service or total denial of the same.
Problems faced by the Sales and marketing team
Just like the IT staff, the sales and marketing team face poor staff training on the software in use. Staff members have no clear knowledge of how to use CS5 software. The inexperience and poor trained staff also face the challenge of dealing with company clients hence portraying a negative image to the company. On the same department is also the use of slow Mac machines which slow the running of activities.
Solutions to problems faced by the company
In order to overcome the above stated problems a clear policy which reflects the needs of the organization must be developed. To add to that proper and regular training of staff must be done in order to improve customer service delivery. Improvement of customer service delivery can also be achieved by employing extra staff to deal with the shortage that is currently experienced in the IT department.
Changes must be made especially with regard to upgrading of machines and software. Fast machines should be acquired and the old ones disposed. The same applies to windows server 2000 in use. Change is needed to ensure that windows 2008 server which has more features and advantages is implemented. The advantages which it introduces include its reliability, ease of installation and scalability (Baskerville, 1998).
Access methods to systems must be well defined to prevent unwanted software installations and downloads that can cause problems to the network bandwidth. To improve the bandwidth, there is need to use dial up connection for fast access. With greater presence of internet means bigger risk of viruses and other malware, thus the need to identify effective antivirus software that should be updated regularly (Angell, 2007). Staff should be trained on proper documentation and implementation of procedures and assets.
Disasters are eminent in every organization. Therefore the only solution to dealing with these is to have proper data backup by use of external hard drives and having separate servers.
Conclusion
Proper documentation is the key to ensuring proper management of systems in place. Everyone should not have access to the same but a few authorized people. This will introduce consistency and ease of operations.
Reference
Angell, I. (2007). Computer security in these uncertain times: the need for a new approach. In The tenth world conference on computer security ,Audit and control, COMPSEC. London,
Baskerville, R. (1998). Designing information systems security. New York :John Wiley and Sons
Salomon, K., & Cassat, P. (2003). Thibeau, Electronic information security: A legal perspective. Dow: Lohnes &Albertson, PLLC.