200T Entries

Components of a Business

Customer service and research and development are few other key components of a business. Customer services, also referred to as technical support depending on the type of business, is an “external human resources department”. HR is involved with internal affairs, customer service is involved with the external ones such as: helping a client/customer in need, handling customer inquiries, resolving complaints, processing orders, making sure customer feedback is satisfactory and more. Research and development is the department involved in innovation. They collect data on the already working systems, product and or service and innovate it depending on the needs and order from higher management.

Where does IT “fit” in an organization? Where doesn’t IT fit in any modern day organization? It is both a centralized department and embedded into other departments within an organization. For example IT in finance will set up the latest accounting systems or ensure cybersecurity for transactions and mitigate fraud. What are the Roles & Responsibilities w/in IT? At the very top lies the chief information officer whose primary responsibility is to foresee the entire organization’s IT department. He or she is the vision of the department much like how a CEO is that to their own organization. Here are some other departments within IT: PMO, architecture, development, security and operations. The development department consists of test, database and reporting. How should IT itself be organized? IT can be a centralized or a decentralized department. Depending on the various factors and priorities set from upper management, IT can be made as a stand alone department or embedded into other departments. An IT department can also be a hybrid of the two.

Cyber Roles & Responsibilities

A System Security Officer is the person responsible for ensuring an organization’s computer systems are secure and protected against any possible cyber threats. They ensure that the policies are adhered to and that the system meets all aspects of cybersecurity regulations. They work closely with the IT teams, system administrators, and security analysts in scanning for vulnerabilities in the system, applying security patches, and preventing attacks. SSOs help organizations adhere to some of the major cybersecurity laws and guidelines, such as NIST 800-12 and FISMA, that aim at the protection of sensitive data.

One of the biggest responsibilities of an SSO is risk management—that is, they regularly scan the system for security vulnerabilities and detect potential threats in order to act on fixing the issues before they become great problems. In the event of a security breach, SSO helps investigate what went wrong, contain the damage, and put measures in place to prevent future attacks. They ensure that all staff understand the security policies and are in line with best practices to ensure data security.

Though not involved in designing or building any IT systems, an SSO plays a rather big role in keeping them secure. They focus on day-to-day security operations, ensuring everything runs safely and smoothly. On the other hand to a Chief Information Security Officer (CISO), who concentrates on strategy, an SSO is more involved in system security and the daily work. Their work is very critical because even the slightest failure in security may lead to huge problems of data leakage, financial loss, or damage to reputation.

Opportunities for Workplace Deviance

The cyber technology has opened new opportunities for workplace deviance by facilitating unethical conduct; suggesting low detection, and enabling a more extensive range of the act. A real case in point is cyberloafing, when employees spend the workday browsing the Internet for non-work-related activities. In remote work contexts, this behavior can lead to a considerable loss in productivity, and it may escape detection (Lim, 2002).

Technology has made data theft and exploitation far easier. Individuals with access to sensitive digital data in the workplace may have an incentive to steal or leak that data, perhaps for financial gain or to retaliate against employers. These insider threats are very powerful since the person has already authorized access (Greitzer & Frincke, 2010).

Moreover, online communication platforms can facilitate abuse or bullying, frequently protected under a coat of privacy or anonymity. It may hurt the spirit of the team and cause severe psychological damage (Ford, 2013).