Don't Make These IT Mistakes in Your Organisation

brokenGears.gif

Top signs you work in a dysfunctional IT environment 

Learn from these real-life examples of less-than best practices, performed both by IT organizations and IT pro

We’ve all worked at “that place,” where processes weren’t followed, best practices were unheard of, and dysfunctional rhythms and routines were the law of the land. In some ways, these experiences can be our greatest teacher, providing an object lesson in how things are not supposed to work.
    
Here are some real-life examples of less-than best practices, performed both by IT organizations and IT pros themselves, as well as the lessons that can be learned from them.

An IT professional’s work life can feel like a never-ending series of crises, thanks to the sheer volume of user requests that pour in on any given day. However, continually operating in fire-drill mode is not a good thing.
Steve Aponte, who is currently program director at Intelligent Product Solutions, can relate. At a former job, IT was bombarded with urgent phone calls for end users whose desktop and mobile devices were failing. 

A best practice is to use a hardware/software inventory system that tracks on a weekly basis when laptops will hit the anniversary of their warranty expiring. “IT needs to take a step back and strategize on preventing things from happening that need a fast response,” he says.

With today’s fast-changing technologies, organizations value IT professionals who are on the cutting edge. But failing to share that knowledge, or even the technologies themselves, can be a problem. This is the situation Ken Piddington faced when he served as consultant several years ago on a project to design a new transactional operations system.

Piddington, now CIO at MRE Consulting, had just finishing up a demonstration when the head of operations pulled him aside and expressed concern that his team wouldn’t be able to use the system. “I asked, `Why – was it too complicated?’ He said no, that they wouldn’t be able to see the screens on their monitors, as they were too small.” He took me to where he sat, and there was this tiny, ancient 13-inch monitor.

Meanwhile, the IT director’s office was like a different world. “It looked like he was flying a plane, with a 22-inch monitor – when that was a rarity – a cool new phone, a PDA, a tablet, all this stuff,” Piddington says.

The IT workers simply had better equipment than everyone else. “They were being the keepers of the technology kingdom and not educating the user community on what was available to help them do their jobs,” he says. It’s certainly common for IT to stay a step ahead of users by testing out cutting-edge technologies and running prototypes, he says, but “it was as if they were keeping the rest of the organization in the dark.”

In the startup world, where the focus is on speed to market, processes can often fall to the wayside; in fact, a lack of mature processes is more often the rule than the exception, he says. Meanwhile, in the mid-market, processes might be well defined, but organizations find themselves bending those processes and pulling resources from core tasks to accommodate customer requests from the sales side.

Lastly, in enterprise-class businesses, siloed work environments can deter technology professionals from being exposed to multiple areas of the business or to new technologies that are being implemented.

IT World:http://http://bit.ly/1ODBjkp

 

« Stagefright: New Android Vulnerability Dubbed 'heartbleed for mobile'
Giant OPM Data Hack Did Blow U.S. Spies’ Cover »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Synopsys

Synopsys

Synopsys is a global leader in electronic design automation and semiconductor IP and is growing its leadership in software quality and security solutions.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

NSEIT

NSEIT

NSEIT offers end-to-end Information Technology products, solutions and services including cybersecurity to organizations in the financial sector.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

Inceptus

Inceptus

Inceptus is a next generation Managed Security Service Provider (MSSP). We are dedicated to keeping our customers safe, secure and protected while doing business on the Internet.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.