I Trust Ipremier Company Case Summary

514 Words3 Pages
I trust ipremier Company did well during the 75 minutes attack, the circumstance was taken care of professionally by all parties included. Mr. Leon from the operations performed superbly by conveying to the CIO 's consideration the current matter as fast as could reasonably be expected and needed to settle on that intense choice to call the CIO amidst the night. Joanne Ripley the specialized operations leader did incredible on her side by reacting quickly at that time and making a beeline for the colocation office to discover and attempt to determine the issue. The CEO, VP of business advancement, the organization 's CTO all did well by bringing in and all getting thoughts to address and resolve the issue. Despite the fact that they took…show more content…
If I was Bob Turley I would have requested that the fitting be pulled regardless of the fact that it means losing the information that would assist the with companying make sense of what had happened. In the event that the site was hacked, it implies client’s data, for example, charge cards, standardized savings numbers would have been traded off. I feel pulling the attachment would have been a superior move in dealing with the potential danger. The organization did not have any crisis strategies or gear, for example, folio and legitimate firewall to handle the problem. If the assault had not stop all alone, and combined with a conceivable interruption, the results on I premier would have been a great deal all the more severe. Pulling the attachment would have decreased the fallout of a conceivable interruption assault, despite the fact that it will have its own advertising outcomes, which could have been managed. I would have ordered the system to be fully shut down even if it meant losing the data that would help the company figure out what had happened. If the website was hacked, it means customers information such as credit cards and social security numbers would have been compromised. I believe shutting it down would have been the safer move in managing the potential risk. Dealing with the stolen data and expense of the fallout of people’s personal information leaking is far more detrimental to the company than losing information about how the DOS
Open Document