Crucial management systems for an organization

Discussion Responses
Q1. Read the below paragraph and write your opinion with 200 words with intext citation and references.
ERP and CRM are crucial management systems for an organization. Organizations use these two systems to enable them to achieve control and better their profitability. CRM is used in the management of the interaction of customers with the business, while ERP is used in the management of the whole business process. CRM plays a vital role in giving an organization customers’ data to enable them to make an informed decision about the customers they should engage in their dealings to ensure business profitability. Through CRM, an organization can also determine the performance of its sales team and strategies that it can use to better customer satisfaction. ERP also brings a number of advantages to the organization, such as improved business reporting, cost savings, better customer service, and reduced inventory costs (Costello, 2022). Because these two systems perform different functions, a company will need to have both. ERP will be used for financial data, while CRM will be used to gain customer data (Costello, 2022). CRM system will enable an organization to increase its sales, thus leading to profits, while the ERP system will enable smooth business operation that will reduce the overall costs. For this reason, both systems are needed for the optimal growth of a company.
Q2. Read the below paragraph and write your opinion with 150 words with intext citation and references.
Compared to 2018, reported data breaches in 2019 jumped by 33.3%, and record breaches jumped by 112%, according to a Risk Based Security research report. Unfortunately, there hasn’t been a commensurate rise in organizational preparedness to lower the risk of cyber-attacks.
Government fines, penalties, and in extreme circumstances, jail time, are some of the consequences of not protecting PII adequately. One ramification many don’t consider is the cost of litigation associated with a breach. Many of the associated lawsuits can end up as class-action lawsuits, potentially multiplying the total cost of the breach exponentially.
Settlements can be harsh — depending on the judge or jury. For large breaches, settlements over $100 million are not out of the question, especially when dealing with healthcare information. Another cost of a breach includes having to pay the plaintiff’s legal bills, which can be extremely high.
When security is breached, the company could be open to a civil lawsuit. This means that the owner or management must ensure a lawyer is contacted at the same time other measures are taken to remedy the problem and communicate with customers. Hiring a lawyer is crucial to prevent unwanted litigation, but the legal representative may have knowledge about the issue. There may be other professionals that need to be contacted to affect a plan of controlling the damage from the incident. This could lead to avoiding a lawsuit with angry customers and liability from employees’ actions.
Q3. Read the below paragraph and write your opinion with 150 words with intext citation and references.
The security culture within an organization needs to ensure that data is transmitted as soon as needed, stored at an appropriate level of integrity, and never lost. This concept is essential because a data breach can be more expensive and have serious consequences, such as damage to an organization’s reputation. It is particularly true if a company’s systems are not protected from outside cyber-attacks (Stempel, 2019). Organizations must establish policies that specifically require that when information is transferred, it is backed up at its destination, encrypted, and adequately protected. While the concept of data integrity is critical to successful cybersecurity, ensuring this aspect is also a challenge for many organizations; many private companies have established their data security initiatives (Gerhardt, 2020). In particular, they use firewalls, encryption technologies, and other security controls to secure data traffic and other information from outside hackers and scammers. However, the concept of data integrity has been largely overlooked, often used in isolation from other cybersecurity measures, while ignoring the implications of the entire system on cybersecurity. For example, many organizations ignore or are unaware of the impact of a data breach on their organization, the resulting impact on business results, the economic impact, and the resulting social and political ramifications on their society (Zipursky, 2020).

Sample Solution

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now