Don't Make These IT Mistakes in Your Organisation

brokenGears.gif

Top signs you work in a dysfunctional IT environment 

Learn from these real-life examples of less-than best practices, performed both by IT organizations and IT pro

We’ve all worked at “that place,” where processes weren’t followed, best practices were unheard of, and dysfunctional rhythms and routines were the law of the land. In some ways, these experiences can be our greatest teacher, providing an object lesson in how things are not supposed to work.
    
Here are some real-life examples of less-than best practices, performed both by IT organizations and IT pros themselves, as well as the lessons that can be learned from them.

An IT professional’s work life can feel like a never-ending series of crises, thanks to the sheer volume of user requests that pour in on any given day. However, continually operating in fire-drill mode is not a good thing.
Steve Aponte, who is currently program director at Intelligent Product Solutions, can relate. At a former job, IT was bombarded with urgent phone calls for end users whose desktop and mobile devices were failing. 

A best practice is to use a hardware/software inventory system that tracks on a weekly basis when laptops will hit the anniversary of their warranty expiring. “IT needs to take a step back and strategize on preventing things from happening that need a fast response,” he says.

With today’s fast-changing technologies, organizations value IT professionals who are on the cutting edge. But failing to share that knowledge, or even the technologies themselves, can be a problem. This is the situation Ken Piddington faced when he served as consultant several years ago on a project to design a new transactional operations system.

Piddington, now CIO at MRE Consulting, had just finishing up a demonstration when the head of operations pulled him aside and expressed concern that his team wouldn’t be able to use the system. “I asked, `Why – was it too complicated?’ He said no, that they wouldn’t be able to see the screens on their monitors, as they were too small.” He took me to where he sat, and there was this tiny, ancient 13-inch monitor.

Meanwhile, the IT director’s office was like a different world. “It looked like he was flying a plane, with a 22-inch monitor – when that was a rarity – a cool new phone, a PDA, a tablet, all this stuff,” Piddington says.

The IT workers simply had better equipment than everyone else. “They were being the keepers of the technology kingdom and not educating the user community on what was available to help them do their jobs,” he says. It’s certainly common for IT to stay a step ahead of users by testing out cutting-edge technologies and running prototypes, he says, but “it was as if they were keeping the rest of the organization in the dark.”

In the startup world, where the focus is on speed to market, processes can often fall to the wayside; in fact, a lack of mature processes is more often the rule than the exception, he says. Meanwhile, in the mid-market, processes might be well defined, but organizations find themselves bending those processes and pulling resources from core tasks to accommodate customer requests from the sales side.

Lastly, in enterprise-class businesses, siloed work environments can deter technology professionals from being exposed to multiple areas of the business or to new technologies that are being implemented.

IT World:http://http://bit.ly/1ODBjkp

 

« Stagefright: New Android Vulnerability Dubbed 'heartbleed for mobile'
Giant OPM Data Hack Did Blow U.S. Spies’ Cover »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

SmartCyber

SmartCyber

SmartCyber is a company specializing in custom IT projects and Cybersecurity.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Superus Careers - Cyber Career Exchange

Superus Careers - Cyber Career Exchange

The Cyber Career Exchange is a specialized recruiting platform focused specifically on cybersecurity.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions is an Enterprise Cyber Security Platforms company offering Cyber Security & Technical Education and Compliance & Penetration Testing Services.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.