Don't Make These IT Mistakes in Your Organisation

brokenGears.gif

Top signs you work in a dysfunctional IT environment 

Learn from these real-life examples of less-than best practices, performed both by IT organizations and IT pro

We’ve all worked at “that place,” where processes weren’t followed, best practices were unheard of, and dysfunctional rhythms and routines were the law of the land. In some ways, these experiences can be our greatest teacher, providing an object lesson in how things are not supposed to work.
    
Here are some real-life examples of less-than best practices, performed both by IT organizations and IT pros themselves, as well as the lessons that can be learned from them.

An IT professional’s work life can feel like a never-ending series of crises, thanks to the sheer volume of user requests that pour in on any given day. However, continually operating in fire-drill mode is not a good thing.
Steve Aponte, who is currently program director at Intelligent Product Solutions, can relate. At a former job, IT was bombarded with urgent phone calls for end users whose desktop and mobile devices were failing. 

A best practice is to use a hardware/software inventory system that tracks on a weekly basis when laptops will hit the anniversary of their warranty expiring. “IT needs to take a step back and strategize on preventing things from happening that need a fast response,” he says.

With today’s fast-changing technologies, organizations value IT professionals who are on the cutting edge. But failing to share that knowledge, or even the technologies themselves, can be a problem. This is the situation Ken Piddington faced when he served as consultant several years ago on a project to design a new transactional operations system.

Piddington, now CIO at MRE Consulting, had just finishing up a demonstration when the head of operations pulled him aside and expressed concern that his team wouldn’t be able to use the system. “I asked, `Why – was it too complicated?’ He said no, that they wouldn’t be able to see the screens on their monitors, as they were too small.” He took me to where he sat, and there was this tiny, ancient 13-inch monitor.

Meanwhile, the IT director’s office was like a different world. “It looked like he was flying a plane, with a 22-inch monitor – when that was a rarity – a cool new phone, a PDA, a tablet, all this stuff,” Piddington says.

The IT workers simply had better equipment than everyone else. “They were being the keepers of the technology kingdom and not educating the user community on what was available to help them do their jobs,” he says. It’s certainly common for IT to stay a step ahead of users by testing out cutting-edge technologies and running prototypes, he says, but “it was as if they were keeping the rest of the organization in the dark.”

In the startup world, where the focus is on speed to market, processes can often fall to the wayside; in fact, a lack of mature processes is more often the rule than the exception, he says. Meanwhile, in the mid-market, processes might be well defined, but organizations find themselves bending those processes and pulling resources from core tasks to accommodate customer requests from the sales side.

Lastly, in enterprise-class businesses, siloed work environments can deter technology professionals from being exposed to multiple areas of the business or to new technologies that are being implemented.

IT World:http://http://bit.ly/1ODBjkp

 

« Stagefright: New Android Vulnerability Dubbed 'heartbleed for mobile'
Giant OPM Data Hack Did Blow U.S. Spies’ Cover »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Indeed

Indeed

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity.

Zeusmark

Zeusmark

Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.

3Lines Venture Capital

3Lines Venture Capital

3Lines Venture Capital invests in exceptional founders and startups working on broad disruptive themes of Future of Work, AI enabled enterprises, and Industry 4.0.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

SpiderOak

SpiderOak

SpiderOak's portfolio of Secure Communication & Collaboration products ensure the confidentiality, integrity, and availability of your most sensitive data in any environment.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.

nodeQ

nodeQ

At nodeQ, we are pioneering the future of computer networks, leveraging our deep expertise in quantum communication, artificial intelligence, and software-defined networking.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.