The brief will also detail the strengths and weaknesses of the company's current system, opportunities of genealogy to improve operations, and threats the current system may pose to the company. Last, the brief will offer suggestions to the company on bettering operations. Key Business and Accounting Needs Judder Fine Foods is a growing business; thus the needs of the company In terms of business and accounting are constantly changing.
Some of the business needs include the need for a purchasing department, the need for an automated inventory and ordering system, and a website where customers can place orders.Other needs of the business include the need for more sales, advertising and marketing, and information technology. The company's accounting needs consist of payroll, accounts payable and receivable system, accounting procedures, and security. Strengths and Weaknesses of Current System Judder Fine Foods currently uses a modular Retail Enterprise Management System that seems to be working for them.
The system is user-friendly and simple to use. Currently, the system is not connected to the Internet so there is less chance of someone hacking into the system.The system is not networked, which Is a weakness because every location Is not sharing information with other locations. Therefore, accessing data from each location can be difficult. This also means every employee would manually have to update his or her workstation.
The current system requires the company to do a great deal of manual tasks, which can waste a great deal of time. This is definitely a weakness in the system because employees can use that time on other areas to improve company operations. Another weakness of the current system is no security measures exist to ensure the Integrity of information employees threats for the company.Opportunities and Suggestions Judder has many opportunities to integrate technology to increase operations within he company. First, there is an opportunity to network the computers onto one server.
This would allow every location to share information. Therefore, minimizing the amount of travel the owner has to do. Networking the workstations can help keep better track of purchasing and inventory because every location can see the information. Judder mentioned in the strategic plan, the company wanted to automate the inventory and ordering system.
Implementing an automated inventory system would allow a more accurate count of inventory. An automated inventory system could also minimize human error. Judder also has the opportunity to integrate a purchasing module to the system and assign one or two people to be in charge. This will help ensure employees are accurately purchasing items.
Taking advantage of these opportunities will help operations run smoother with fewer errors. To take advantage of these opportunities, Judder should first network the computers to one server.A midrange system would be ideal as it would be able to handle the company's Internet functions, intranet, and any other software the company uses. Midrange systems are also "less costly to buy, operate, and maintain, and thus meet the computing needs of many organizations" (O'Brien & Marks, 008, peg. 82).
The company can use the intranet, which is connected to the network, to capitalize on the automated inventory and ordering system, and the purchase module opportunity. With the intranet, employees can monitor inventory and purchasing in real time.Employees at one location can complete all functions, but all locations can have access to the information. Possible Threats from System and Suggestions Kidder's main issue with their current system is no security. No security poses a great deal of threats to the company and its information.
"The REAMS has embedded security features... Swords, dollar limits, limited access features...
However there are no formal company policies or audits regarding the same. There are no written policies relative to security of the finance and accounting systems" (University of Phoenix, 2011).Having embedded security features is a start, but it does not ensure the integrity of the information because employees may share passwords with other employees giving them access to confidential or sensitive information. This could lead to the misuse of confidential information. No written policies pose a threat because no one will know what information he or she can and cannot access and hat information he or she can and cannot share with others. Judder cannot assume people already know this.
Another threat is the system lacks any backup procedures in case of a system crash or an intrusion of the system.Information is not protected because there is no firewall, which makes the system open to spare and virus attacks. Aside from having embedded security features in the REAMS system, Judder should also be sure to password protect the computers used for accounting purposes. This will allow access only to those doing the accounting for the company. The company also needs to have written policies. Written policies will outline rules and regulations regarding the security of information.
Written policies will also explain how to keep information secure and what to do if there is a security breach. Isolations. The company needs to have backup procedures in case the system crashes. The system should be set to back up every other day or everyday to ensure not to lose too much information.
To better protect confidential information from intrusion, the company should have some firewall protection. A firewall "guards against unauthorized access to sensitive file information from external internet users. On networked systems, firewalls are often standalone devices with built-in, protective software" (Beggaring, Siskin & Strand, 2008, peg. 39).
The company should also invest in anti-spy;are and anti-virus protection to protect the system from any viruses. Following the above suggestions will help minimize any threats to the company's current system. Kidder's current retail management enterprise system is working for them but could use some upgrading to enhance the company's operations. Judder has to network its computers so that all locations can share information.
To make sure information is secure; the company should have firewall retention as well as anti-virus and spare protection.