No matter how many resources a company spends on network security, spam filters, and hardware or software, the biggest vulnerability to networks are still humans!
IT Operating Model
IT has long become part of the business using connectivity, business analytics and automation to launch new opportunities. With evolving needs, there has been different approaches to categorize new IT Operating models: The digital factory model, Agile IT and many more. Read on to find out which suits your business the most!
Spending on IT equipment can quickly chalk up high costs, especially if one undertakes the wrong model. Should IT equipment be purchased or leased? There are also various models of leasing, so it can be quite tricky to decide on one too. Jay from ONTRAPORT shares with us his approach!
It is important to note that IT doesn’t make these decisions -- we bring the options to management. From there, the management will then factor in their model and make the right choice, since there might be other considerations like launching large marketing campaigns which take up free cash flow and make leasing more attractive.
With remote employees, it is definitely tougher to keep them fulfilled and engaged. This will very likely entail a drop in their productivity, threatening the bottom line as a result. However, despite the lack of face-to-face interactions, there are certainly avenues to keep remote employees engaged. You don’t need a team lunch or team event to do so.
If we have to get on a remote support call, we will then ping the colleague on skype and thenset up a GoToMeeting for screen share. In more extreme cases, we use FaceTime to see what is going on in real time, e.g. if a printer is clogged.
BYOD is great, but as soon as employees start complaining around expensive calls or data usage, you might need to provide a business cell phone plan. Naturally the best option to limit expenses here is to clearly define who will need cell phone plans, e.g. executives or salesforce.
Some people might feel hot, others are cold. There is only one thermostat in your company - what to do? It starts with the design of HVAC systems to design a layout that distributes heat or cool air evenly across the facility. However there are clever tools such as Comfy that might help your workforce to tell you how they feel about the temperature so you can react faster.
Companies in the recent years are getting increasingly worried, and thus setting up surveillance cameras to monitor the workplace or the office.
As an IT manager, it’s easy to get carried away by the variety of products, but laws can be quite restrictive depending on the geographical area, type of employees (e.g. union workers) and type of area you are looking to do active surveillance in.
We know how annoying it is to have an important call but no quiet meeting room is available. Enabling your workforce to meet and have productive calls using conference room booking apps is essential.
From what we’ve seen, many companies simply use different calendars for different rooms which might be easiest for a small number of meeting rooms. And if you don’t have any meeting rooms anymore, there’s still Breather!
Office security systems typically consist of access control, alarm and video surveillance. Depending on the type of office and industry you are in, there might be different approaches and requirements. The usual process would include asking a security consultant to get a system designed.
Especially with sales-heavy or distributed teams, you are likely tangled in endless video conferences. From our own painful experience, we can attest that main benchmarks should be reliability, quality of the microphone, speaker as well as an investment in a large HD screen.
Don't take our word for it though. read on for yourself!
With the prevalence of many different IT devices in workspaces today and the increasing threat of data theft, Mobile Device Management (MDM) is the undisputed cornerstone of a company’s data safety. The wide array of MDM tools can be rather confusing, thus we have broken down the different tools.
"Most businesses deploy MDM when they’re required to: prospect security requirements, or business certifications requirements. The advice I would give someone looking into device management is toget started as soon as you think it is an issue."
Needless to say, setting up WiFi for enterprises is much more complicated and bad WiFi is a no-go. The area to be covered is much larger, and uptime has to be a hundred percent. It is essential to do sufficient research before deciding on the service provider and the plan as switching can be rather troublesome.
The #1 thing to do is to do a survey to measure signal strength in dbm - look at a location where the antenna is, see which antennas are operating in the surrounding area to see other antennas that reach into this location. Only after doing this do you pick the channel that has the least competitiveness.
The best employee onboarding processes are the ones which are comprehensive yet not cumbersome. As for offboarding, the process needs to ensure that all security loopholes are addressed and that there won't be any potential security threats. Read on to find out how Nick from Bettercloud has perfected these two processes!
Our gold standard in employee onboarding is that people start on Friday. Earlier that week on Tuesday, their google accounts get provisioned and access to most programs gets turned on -- including access to the building.
Yubikey Review - Hardware Auth Tokens for Two Factor
The need for two-factor identification is imminent with the rise of office employees working remotely and traveling—often leaving their laptops in cars, trains or subways. In this post, Justin Millett, IT Analyst at Carris Reels, gives an overview of why they looked into Yubico’s YubiKey, how YubiKey compares to other hardware authentication devices on the market and gives us a quick review of YubiKey.
Defining IT budgets is a tricky issue that IT managers will have to deal with at least once every year, or perhaps even every quarter. Among other considerations, IT managers will need to determine the costs and benefits of each budget decision.
In order for an IT director to efficiently decide what to spend money on, he has to bean essential partner to the business- not just a “tech plumber” whom people call on demand.
Especially with GDPR laws kicking in, how your vendors handle data is also an area of your concern. Thus it only makes sense to put them through a rigorous security assessment before engaging them. Having said that however, the assessment process should not be a chore in a bid to achieve rigor. Dave shows us how Greenhouse's vendor security assessments are both rigorous and efficient!
Today, we add a security review to the procurement process ensuring that any vendor who could impact information security is properly vetted before we sign the contract.