Don't Make These IT Mistakes in Your Organisation

brokenGears.gif

Top signs you work in a dysfunctional IT environment 

Learn from these real-life examples of less-than best practices, performed both by IT organizations and IT pro

We’ve all worked at “that place,” where processes weren’t followed, best practices were unheard of, and dysfunctional rhythms and routines were the law of the land. In some ways, these experiences can be our greatest teacher, providing an object lesson in how things are not supposed to work.
    
Here are some real-life examples of less-than best practices, performed both by IT organizations and IT pros themselves, as well as the lessons that can be learned from them.

An IT professional’s work life can feel like a never-ending series of crises, thanks to the sheer volume of user requests that pour in on any given day. However, continually operating in fire-drill mode is not a good thing.
Steve Aponte, who is currently program director at Intelligent Product Solutions, can relate. At a former job, IT was bombarded with urgent phone calls for end users whose desktop and mobile devices were failing. 

A best practice is to use a hardware/software inventory system that tracks on a weekly basis when laptops will hit the anniversary of their warranty expiring. “IT needs to take a step back and strategize on preventing things from happening that need a fast response,” he says.

With today’s fast-changing technologies, organizations value IT professionals who are on the cutting edge. But failing to share that knowledge, or even the technologies themselves, can be a problem. This is the situation Ken Piddington faced when he served as consultant several years ago on a project to design a new transactional operations system.

Piddington, now CIO at MRE Consulting, had just finishing up a demonstration when the head of operations pulled him aside and expressed concern that his team wouldn’t be able to use the system. “I asked, `Why – was it too complicated?’ He said no, that they wouldn’t be able to see the screens on their monitors, as they were too small.” He took me to where he sat, and there was this tiny, ancient 13-inch monitor.

Meanwhile, the IT director’s office was like a different world. “It looked like he was flying a plane, with a 22-inch monitor – when that was a rarity – a cool new phone, a PDA, a tablet, all this stuff,” Piddington says.

The IT workers simply had better equipment than everyone else. “They were being the keepers of the technology kingdom and not educating the user community on what was available to help them do their jobs,” he says. It’s certainly common for IT to stay a step ahead of users by testing out cutting-edge technologies and running prototypes, he says, but “it was as if they were keeping the rest of the organization in the dark.”

In the startup world, where the focus is on speed to market, processes can often fall to the wayside; in fact, a lack of mature processes is more often the rule than the exception, he says. Meanwhile, in the mid-market, processes might be well defined, but organizations find themselves bending those processes and pulling resources from core tasks to accommodate customer requests from the sales side.

Lastly, in enterprise-class businesses, siloed work environments can deter technology professionals from being exposed to multiple areas of the business or to new technologies that are being implemented.

IT World:http://http://bit.ly/1ODBjkp

 

« Stagefright: New Android Vulnerability Dubbed 'heartbleed for mobile'
Giant OPM Data Hack Did Blow U.S. Spies’ Cover »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

Stage2Data

Stage2Data

Stage2Data is one of Canada’s most trusted cloud solution providers offering hosted Backup and Disaster Recovery Services.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.