Move Inn Estates Case Study

50 %
50 %
Information about Move Inn Estates Case Study
Business

Published on July 23, 2014

Author: MichaelWChitwa

Source: slideshare.net

Description

Move Inn Estates is an estate agent which offers residential sales, lettings and property management across West London (Move Inn Estates, 2014). According to their website (http://www.moveinnestates.co.uk/), Move Inn Estates’ aim is to provide an “honest, trustworthy relationship and providing expert advice whilst moving home”.

Move Inn Estates Michael W. Chitwa M00502568

INTRODUCTIONThe nature of their business is providing landlords with the market to let out property and tenants looking to rent. As defined in their portfolio, they pride themselves in: Finding landlords who would like to rent out property Finding tenants through use of technology and referrals to link up with a landlord Renting out property to tenants Looking out for residencies ready to let The goals of Move Inn Estates plans to have expanded their base in the following areas: Increase their portfolio to having over 200 properties Selling properties – possibly franchise Increase their fleet of company cars Employ additional staff into their growing team Staffing if needed Drift into the radio and TV market

BENEFITS THAT EMPLOYING IT WILL BRING FOR MOVE INN ESTATES Improved Communication Human Capital Efficiency Mobility Property Management Presentations and Documents Multi-site Networks

Mind Map – Move Inn Estates

SAFETY AND SECURITY OF IT INFRASTRUCTURE a) Identification and Access b) Encryption c) Protection of Software and Data d) Disaster-Recovery Plans

IT INFRASTRUCTURE SECURITY POLICY Preparation: it begins with creating a usage policy statement which outlines users’ roles and responsibilities with regard to security. Next, comes conducting a risk analysis that identifies the risks to your computer/network, resources and data. A threat rating can be assigned as either low risk, medium risk or high risk. Finally, you establish a security team structure which should be aware of the security policy and the technical aspects of security design and implementation. Prevention: this is further subdivided into approving security changes which are changes to network equipment that have a possible impact on the overall security of the network and monitoring security of your network which focuses on detecting changes in the network that indicate a security violation. Response: this is how the organisation will react in the event of a disaster. It can be broken down into security violations, restoration and review. A violation occurs when a security has been breached. This is followed by restoration which ensures that the normal operations of the computer system have been returned. The final part is the review of the processes in creating and maintaining a security policy.

IT BEST PRACTICES Ensure an antivirus installed in your computer(s). Ensure that your network firewall is enabled and configured properly. Update computer and network software as these regular patches fix loop-holes in your software and programs. Carefully scrutinize software and programs that you download and run on your computer(s). Avoid using pirated or cracked software as it is more likely to have been tampered with and can damage your computer.

IT BEST PRACTICES, cont’d. Beware of software and websites that are prone to phishing attacks. Do not reuse the same password everywhere. If you do and a leak on one of the websites that you frequent and are registered to is compromised, your personal information would be available to all. Use secure passwords that are easy to remember but not easy to break. The minimum password should be six digits long, contain at least one non- alphanumeric character and a capital letter (Hess, 2013). Take care of email attachments, not all of them could be genuine. Do not use public Wi-Fi hotspots without using a VPN (secure) connection. Beware of what kind of information you publish and share on social media sites. Regularly review your online accounts and credit report. Backup your files or data that you will definitely use later. Secure laptop computer and other portable devices at all times. Lock them up or carry them around with you if you must. Do not store sensitive information or your only copy of critical data, project files, etc. on your portable device

MIND MAP OF SOCIAL NETWORKS AND WEB 2.0 APPLICATIONS

Cost-Benefit AnalysisCurrent Year (CY) CY +1 CY +2 CY +3 CY +4 Total Amount Costs Hardware £ 4,000.00 Software £ 2,500.00 Operation and maintenance £ 1,250.00 User training £ 2,000.00 Implementation costs £ 2,500.00 Licences £ 900.00 Time £ 1,000.00 Security £ 2,550.00 Startup fees £ 5,000.00 Total Costs (Future Value) £ 21,700.00 £ - £ - £ - £ - Total Costs (Present Value) £ 21,700.00 £ - £ - £ - £ - £21,700.00 Benefits Intangible Benefits Improved efficiency £ - Property management £ - Customer satisfaction £ - Improved company reputation £ - Tangible Benefits £ 5,000.00 Communication £ 5,000.00 Better mobility £ 9,000.00 Improved performance £ 4,500.00 Increased Profits £ 6,500.00 Improved service delivery £ 1,000.00 Total Benefits (Future Value) £ 31,000.00 £ - £ - £ - £ - Total Benefits (Present Value) £ 31,000.00 £ - £ - £ - £ - £31,000.00

Disaster Recovery Plan 1. Purpose and Objective............................................................................................................................................3 Scope............................................................................................................................................................................3 2. Dependencies..........................................................................................................................................................3 3. Disaster Recovery Strategies...................................................................................................................................3 4. Disaster Recovery Procedures ................................................................................................................................3 Response Phase............................................................................................................................................................3 Resumption Phase........................................................................................................................................................3 Data Center Recovery...............................................................................................................................................3 Internal or External Dependency Recovery..............................................................................................................3 Significant Network or Other Issue Recovery (Defined by quality of service guidelines)........................................3 Restoration Phase ........................................................................................................................................................3 Data Center Recovery...............................................................................................................................................3 Internal or External Dependency Recovery..............................................................................................................3 Significant Network or Other Issue Recovery (Defined by quality of service guidelines)........................................3 Appendix A: Disaster Recovery Contacts - Admin Contact List .......................................................................................3 Appendix B: Document Maintenance Responsibilities and Revision History .................................................................3 Appendix C: Server Details ..............................................................................................................................................3 Appendix D: Glossary/Terms ............................................................................................................................................................3

Email Usage Policy Purpose Scope Policy Prohibited use Personal use Monitoring Enforcement Definitions Agreement Revision History

Add a comment

Related presentations

Boat chandlery

Boat chandlery

October 26, 2014

http://ecommerce-for-business.com/shackles-boats-theboatonlinestore/ We offer a ...

http://vendere-su-internet.com/shackles-for-boats-from-theboatonlinestore/ Moori...

Silver bar!

Silver bar!

October 21, 2014

Pretty similar to gold bars are these silver slabs. Silver is considered as the mo...

Gold coin prices!

Gold coin prices!

October 21, 2014

If you are an investor of gold bars and coins, one of the major things that you ou...

CyberSecurity's social media stats for one week as of Oct 21st 2014

CyberSecurity's social media stats for one week as of Oct 28th 2014

Related pages

Move Inn Estates Southall – John Moynes

Move Inn Estates Southall. John Moynes. Menu. ... research study, ... Society’s view of supported only one or 2 case & practice management software ...
Read more

Case Studies | Premier Moves

This is the case studies page ... to move 35 staff. View Case Study > ... changes of staff at its South Bank and Grays Inn Road properties. View Case Study >
Read more

Why China? A study of why foreign hotel companies are ...

A study of why foreign hotel companies are rushing to develop new ... IHG partnered with Sands China Ltd. to develop the world’s largest Holiday Inn, ...
Read more

News | North Cove Estates | – North Cyprus Property

Case Study; Investing In Cyprus ... So your dream home by the sea is ready to move ... At North Cove Estates we can help you sort out all the finer details ...
Read more

Properties To Rent in Coventry - Flats & Houses To Rent in ...

Find Properties To Rent in Coventry ... Added yesterday by Cloud9 Estates Ltd, Coventry. Added yesterday. 02475 060177 Local call rate. Email agent . 9.
Read more

Brazil property - Real estate in Brazil | PropertyBrazil.com

Find properties for sale and rent in Brazil on PropertyBrazil.com, the No. 1 Brazil real estate portal. We also offer a Forum, Travel guides and Pro section.
Read more

International, Domestic & Overseas Property Listings

TheMoveChannel.com is the number 1 international property search portal, ... Country Estates [159] Farmhouses [570] ... Study [89] Summer House ...
Read more

Case Study Amber Inn & Suites, Inc. Chief 9862505 廖語婕 ...

Case Study Amber Inn & Suites, Inc. Chief 9862505 廖語婕 9862525 王修彥 9862529 宋惠華 9762508 洪啟智 9862513 邱揚程 9862507 郭惠華 ...
Read more

John Lewis Partnership (At Home Store): Chester | Butler ...

John Lewis Partnership (At Home Store): Chester. ... Case Study CATEGORIES. ... £10M Client: Aviva Investors & Kingston Estates Architects: ...
Read more