Preview

Smoothie King

Better Essays
Open Document
Open Document
2132 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Smoothie King
Case Study: Smoothie King

Summary
Smoothie King is the original nutritional smoothie bar and health marketplace since 1987 and within one year realized the key to their success and growth would be to develop a franchise system. The Smoothie King brand has been recognized by Entrepreneur Magazine as being # 1 in the juice bar category for 15 consecutive years and has seen steady growth with approximately 610 franchised units in over 35 US states (www.worldfranchising.com). As with every franchise system there are series of steps from the initial interest in the franchise to the opening of a new location. Each step encompasses some form of information technology such as; the franchises support software used to translate the information on the request form to a excel spreadsheet that sends notification to the marketing team to mail out a physical packet to the interested party. Everything from the various electronic communication (email) to the training software used by the human resources team to train all members of management on Smoothie King’s hiring, training, reference/background checks, and etc for new team members all uses some form of information technology. In this case you are asked to examine the various information technology systems used by Smoothie King in their franchise system.
1. Identify safe ways to send important documents through the e-mail
As technology touches every aspect of a business finding ways to safely and securely send documents of a sensitive nature containing confidential information via the internet or a company’s intranet is becoming increasingly important. There are people out in the world who make it there business to sneak into company’s systems just to learn what they are “up to”. These hackers are the reason that many organizations have invested several thousands of dollars to ensure that all electronic communication sent on their company server is safe and secure. However, no matter how much money, time, and

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Junk Van CAse

    • 594 Words
    • 2 Pages

    The root problem is Information errors and inefficiencies, which are impacting operations, reputation with customers, and increasing costs. Mr. Kingo’s goal to wanting to grow his business into a franchise, he needed to find a way to streamline the information correctly and to make the entire process smoother.…

    • 594 Words
    • 2 Pages
    Good Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Using QR Codes to Store Patient Information in a Cloud Computing Environment for Knight Radiology, Inc.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The rapidly evolving economy has led to companies being largely controlled by an IT infrastructure as it is an important part of business operations, and it bridges communication gaps well. Those corporations that pay no heed to the necessity of computer forensics in the modern age risk damage to digital resources and intellectual property. A singular breach into the system can lead to massive financial loss[1]; subsequently leading to bad publicity of the business and prolonged losses in the long run. The methods used by attackers to breach into networks are constantly advancing as a result of experts who are able to fend off attacks. This is a cause for concern for experts worldwide. It is important to bear in mind that threats can be both…

    • 217 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Businesses need to ensure the secure storage of company files and the guaranteed privacy of employee information. With the increased use and demand for network computing, information security has become a high priority. With all the ways in which someone can gain access to private and confidential information, the previous safe measures need to be enhanced and improved (Yaoxue Zhang; Laurenc T. Yang; Yuezhi Zhou; Wenyuan Kuang. 2010). For example, employee and company files are…

    • 962 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Information Security has come to play an extremely vital role in today’s fast moving but invariably technically fragile business environment. Consequently, secured communications and business are needed in order for both Cooney Hardware Ltd. and our customers to benefit from the advancements the internet has given us. The importance of this fact needs to be clearly highlighted, not only to enhance the company’s daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security.…

    • 676 Words
    • 2 Pages
    Good Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    If someone comes into the company then they will get an induction pack and within the induction pack it will have information on how to handle information. This will include once reading the information you should lock the information away securely. If you are passing on sensitive information via email then it should have a password encrypting the file.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Vulnerabilities unfortunately exist, creating the need for a security system imperative. Computer criminals, or commonly known as hackers pose a large threat to corporations big and small. Hackers find holes in the security, exploiting valuable information about a corporation or customer. Hackers go through the system, falsifying the database, making it difficult for companies to…

    • 539 Words
    • 3 Pages
    Good Essays