Please note! This essay has been submitted by a student.
In decentralized organization, decision making process is a 2-way communication. Top management pass the project with all guidelines and policies to a team of people and they keep open line of communication for decision making process. Based on the need, requirement and suggestion by a team, top managers or owners are open for changes in policy or system. Biggest benefit or Pros of a Decentralized structure, it is more open, flexible and management is open for any change. Due to involvement of all team member, innovation and success of entire project is very strong which benefit the company.
Culture is unique way to define an organization. For example, are we dress same way everywhere as we dress on golf course? Are we dress same way everyday as we are on any event? IT Organizational culture is also work like the same way as we do follow our own culture or things in our own unique way. Every organization has their own unique way of doing the business or unique personality just like we have. That’s the uniqueness of an organization defines as Culture. These shared values have huge influence on entire organization and its staff. Organizational culture is intangible or invisible but still powerful enough to influence the behavior of entire organization. Organizational culture mainly based on beliefs, assumptions, values and vision which expect how entire organization behave. Culture drives people about what to dress, what to do in any given situation. Every organization have unique approach to define a Culture and it may vary on priority to high, medium and low. It is very important to have clear, define organizational culture.
Communication plays very vital role on every stage of a business-like planning, organizing, controlling, budgeting, forecasting, creating a business plan etc. Communication channels may vary as Internal communication or External communication. Proper communication can help managers and top management to perform their roles and responsibilities more easily. Managers are constantly engaged in different types of communication channels like over phone or face to face either with supplier, vendor, colleague, client and also in written communication channel like email, letter etc. Communication is so important for overall success of an Organization.
Like all other the regulatory compliances imposed on organizations by the government, HIPAA covers healthcare sectors which includes hospitals, clinics, pharmacies, dentist and individuals who work in the sector like physicians, nurses, surgeons, doctors, etc. Healthcare organizations are always at risk of healthcare data breaches as it was proven in 2015 which sparks the biggest breaches ever discovered. 78.8 million healthcare records were compromised in a single cyberattacks at Anthem Inc., and 10 million or more of records were stolen in 2015 (HIPAA Journal, 2018). Larry Boettger, who spoke at NAIRO’s educational Symposium mentioned that 94% of healthcare organizations admitted to having at least one breach from 2015 till 2017 due to attacks on their system (National Association of Independent Review Organizations, 2016). Boettger, as senior solutions architect at VIMRO, also mentioned that lack of human and financial resources as the main problem for organizations facing HIPAA compliance issue.
Boettger stressed on top 10 challenges that IT divisions within organizations face.
Missing patches for operating systems and applications: Having the latest patches and updates for the operating system and application software is of utmost important for IT division and the process for this should be automated to ensure up-to-date security. Falling behind in patches for both operating systems and applications would place make them vulnerable toward attacks and/or breaches.
Failure to monitor and detect sensitive data loss (data exfiltration): Be the first to know once your data is breached is always the best option. To response to any attacks or breaches, IT division need to be the first to detect the breach, which can be automated, and response to those breaches.
Weak passwords: Multifactor authentication is another alternative to password authentication since weak passwords are prone to be easy targets for decryption from attackers. Passwords should meet the minimum standard for strong encryption which would need to include upper and lower-case letters, numbers, and symbols.
Lack of logs and audit trails than can conduct forensics to identify and respond to a breach: Having definite logs on access to the system and database can help identify possible threats and help prevent possible threats rather than response afterward when the breaches already happen.
Some applications have deficiencies in coding, which can lead to a breach: Applications are developed, utilized, control and monitor by humans which cannot be perfect. Constant control on the security of the applications is always the best option for organization.
Lack of security validation for new systems: System validation can aid organization in achieving compliance if the system such as Electronic Health Records (EHR), are configured securely and passed the vulnerability and penetration validation.
Missing or outdated anti-malware technology: Anti-malware are considered the weakest of security, it is still necessary for safeguarding the system. Updating the anti-malware through a centralized system is best practice in keeping anti-malware up-to-date.
No encryption of sensitive information in transit: Data in the form of emails or files sharing are vulnerable without encryption mechanisms. Effective encryption mechanisms are needed to secure security in sharing data between departments and/or between computers.
Lack of trained staff to maintain security controls: Hiring full-time IT personnel to enforce and monitor is always a big cost for organizations. General security training for non-technical staffs are always good to maintain security within organization and employees would understand their roles in keeping the business process safe and secure.
Outdated disaster recovery plans: Always re-evaluate the disaster recovery plans and make sure that it is up-to-date along with the current business practice and security regulatory compliance imposed by the government.
Finding from our research are mentioned below how IT governance will improve the quality of the IT division to gain regulatory compliance. The following factor are depending upon the improving the IT governance.
Simple and responsibility
Stake holder value
A very important fundamental concept of MIS planning is that the organization’s strategic plan (Business Plan) should be basis for MIS strategic Plan. Alignment of MIS strategy with organizational strategy is one of the central problems of MIS planning. The information master plan establishes a framework for all detailed information system planning. Information master plan typically has one long range plan for three to five years and one short range plan for one year.The long range portion provides the general guidelines for direction and short range portion provides a basis for specific accountability as to operational and financial performance.
Staffing: Within an Organization recruiting the professional or skilled labour and finding the right employee to work for them plays a major role for the success or failure. For example: In an Organization, if we recruit unskilled or unprofessional employee who won’t be able to complete the assignments or tasks assigned to him on time which will have a impact on their business as well as It is loss to the Organization as they spend money and waste time on recruiting the resource as that particular resource is unfit for the role. So, staffing plays a key role for any Organization for recruiting the right resource at right time.