Don't Make These IT Mistakes in Your Organisation

brokenGears.gif

Top signs you work in a dysfunctional IT environment 

Learn from these real-life examples of less-than best practices, performed both by IT organizations and IT pro

We’ve all worked at “that place,” where processes weren’t followed, best practices were unheard of, and dysfunctional rhythms and routines were the law of the land. In some ways, these experiences can be our greatest teacher, providing an object lesson in how things are not supposed to work.
    
Here are some real-life examples of less-than best practices, performed both by IT organizations and IT pros themselves, as well as the lessons that can be learned from them.

An IT professional’s work life can feel like a never-ending series of crises, thanks to the sheer volume of user requests that pour in on any given day. However, continually operating in fire-drill mode is not a good thing.
Steve Aponte, who is currently program director at Intelligent Product Solutions, can relate. At a former job, IT was bombarded with urgent phone calls for end users whose desktop and mobile devices were failing. 

A best practice is to use a hardware/software inventory system that tracks on a weekly basis when laptops will hit the anniversary of their warranty expiring. “IT needs to take a step back and strategize on preventing things from happening that need a fast response,” he says.

With today’s fast-changing technologies, organizations value IT professionals who are on the cutting edge. But failing to share that knowledge, or even the technologies themselves, can be a problem. This is the situation Ken Piddington faced when he served as consultant several years ago on a project to design a new transactional operations system.

Piddington, now CIO at MRE Consulting, had just finishing up a demonstration when the head of operations pulled him aside and expressed concern that his team wouldn’t be able to use the system. “I asked, `Why – was it too complicated?’ He said no, that they wouldn’t be able to see the screens on their monitors, as they were too small.” He took me to where he sat, and there was this tiny, ancient 13-inch monitor.

Meanwhile, the IT director’s office was like a different world. “It looked like he was flying a plane, with a 22-inch monitor – when that was a rarity – a cool new phone, a PDA, a tablet, all this stuff,” Piddington says.

The IT workers simply had better equipment than everyone else. “They were being the keepers of the technology kingdom and not educating the user community on what was available to help them do their jobs,” he says. It’s certainly common for IT to stay a step ahead of users by testing out cutting-edge technologies and running prototypes, he says, but “it was as if they were keeping the rest of the organization in the dark.”

In the startup world, where the focus is on speed to market, processes can often fall to the wayside; in fact, a lack of mature processes is more often the rule than the exception, he says. Meanwhile, in the mid-market, processes might be well defined, but organizations find themselves bending those processes and pulling resources from core tasks to accommodate customer requests from the sales side.

Lastly, in enterprise-class businesses, siloed work environments can deter technology professionals from being exposed to multiple areas of the business or to new technologies that are being implemented.

IT World:http://http://bit.ly/1ODBjkp

 

« Stagefright: New Android Vulnerability Dubbed 'heartbleed for mobile'
Giant OPM Data Hack Did Blow U.S. Spies’ Cover »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Landry & Associates

Landry & Associates

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

ABB

ABB

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT.

Sequoia Capital

Sequoia Capital

Sequoia Capital is a venture capital firm focused mainly on technology. We partner both with young companies finding their stride and established ones looking for growth.

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Mindmajix Technologies

Mindmajix Technologies

Mindmajix is a live and interactive e-learning platform that offers professional online IT training in areas including cyber security.

Secfix

Secfix

Secfix helps companies get secure and compliant in weeks instead of months. We are on a mission to automate security and compliance for small and medium-sized businesses.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

BLOCX

BLOCX

BLOCX is designed to address the ever-growing challenges of managing and securing digital devices, from personal computers to corporate networks.

ColCERT

ColCERT

ColCERT is the national cybersecurity emergency response team of Colombia.

Intech Security

Intech Security

Intech Security provides expert cybersecurity services, including Cyber Essentials, to protect UK businesses from digital threats and ensure compliance.