It is expected that a CPA will not engage in an assignment without proper qualifications. Your firm has the ability to bid on two projects: the first is engagement and examination work—not consulting or audit—for a small county hospital. The second is work for a private, not-for-profit nursing home. Prepare a memo of 700-1,050 words for the senior partner. Include an abstract.
An analysis of the network systems in use The current network system that Patton-Fuller is using is a network that is One GB, using Cat 6 and single Mode Fiber which gives greater speeds and trusted reliability. The technologies that are in place also have an intelligence built into them that alerts the network operations center when any malicious intend to the system is being done. The network also has a build in redundancy to prevent collision. Patton-Fuller has been using a CISCO System 7609 Router and a CISCO Systems ASA 5510 VPN (Virtual Private Network) Router. This helps with secure VPN and Internet traffic through the ASA 5510 VPN Router.
In conclusion, Kudler Fine Foods needs an effective management team to operate successfully at their best ability by allowing them to implement their knowledge and skills to improve productivity around the business. Improving the website will definately allow the business to improve service therefore will atract more clients to increase revenue. Fixing this issue will improve many other areas of the business and become a better
Corporate headquarters could benefit from replacing the 24-port hub with a 24-port switch. In all the networks, replacing the hubs with switches will help to alleviate possible network congestion caused by the hubs rebroadcasting the signal to every device on the network. These changes will provide more bandwidth per channel to accommodate more VoIP phones and other expansion if needed in the future. In addition, the new switches will segregate the single larger networks into smaller Virtual LANs, which will further alleviate network traffic. A disadvantage
By proper end user training for anyone involved with the Corporate Techs site, proper scanning of all USB and thumb drives on a test computer being used for this particular site, can mitigate threats from bugs and viruses. Also, by changing all local computer default autorun policies, will disable usage of these USB ports and stop an occurrence from taking place. Last, it’s almost near impossible for an end user to not use a personal laptop during work hours for personal use or for work. But to mitigate further problems from happening, I will implement an encrypted file system for sensitive data. TrueCrypt is a program that I have found efficient that controls over endpoints that enter and exit the internal system.
Work Breakdown Structure (WBS) will breakdown project scope and requirements into groups of component tasks that will be manageable Schedule Management Plan will provide a process to gather, analyze, develop and control the schedule of project activities. Given the specific requirements for resource scheduling and lessons learned from previous project, it will be important to align the schedule to resource availability and
It would be highly suggested that each user to have secure passwords as part of their login details in order to enhance the security of the environment further. The Wireless portion of the network is possibly the greatest area of potential security concern This needs to be secured so that no open network is presented to anyone within range of the Access Point. A combination of disabling the broadcast of the SSID (Wireless Network Name) with WPA-2 Encryption will create the desired level of security. An additional possibility would be to only allow certain devices to connect to the Wireless Network by restricting them in accordance with their MAC (Physical Network) Address. Finally, if we extend security to include the security of the business data then adequate backup mechanisms and redundancy/ resiliency measures need to be in place.
A potential opportunity that they could explore is to utilize self-checkout terminals in their locations. Self-checkout point of sale terminals could do many things to improve Kudler Fine Foods as a retail competitor. First, it would improve their customer service as many customers prefer to check themselves out rather than having a cashier. In today’s technology environment, “…systems can be tailored to better fit any retail environment and are more focused on improving customer service rather than cutting labor costs” (Murphey, 2009, p. 1) . Even though the prime focus of these systems is not necessarily to cut labor costs, often times they can improve efficiency.
In order for Kudler Fine Foods to develop a functioning frequent shopper program, it must track and monitor consumers shopping behavior. The drive of market research is to collect data on consumers and prospective consumers. The collected statistics support business decision making, which therefore diminishes the risks involved in making these conclusions. This type of research would also benefit the consumer by lowering the cost on items bought most, while giving them personalized incentives to return. As a result, legal matters concerning privacy of the consumer has risen and established far more attention.