• define your IT objectives in a new way

    Define Your IT Objectives in a New Way

    The previous blog entitled Business Alignment Criteria presents six considerations you should collaborate on with your business colleagues before you begin the process of defining your IT objectives. Once the business alignment criteria portion is complete, you are ready to define your IT-specific objectives. Follow the steps and tips below below for guidance. 1. Understand […]

  • business alignment criteria six key areas IT

    Business Alignment Criteria – 6 Key Areas

    The alignment of business and IT objectives is a rising priority for many forward-thinking CIOs and technology departments. Executives are more interested in conversations about how- IT delivers value to the business and end user than just a technology discussion. Following is a deep dive analysis of six key areas where IT and the business […]

  • business service focus and IT alignment

    Moving From a System Focus to a Business Service Focus

    To ensure alignment of business and IT objectives, it’s important that organizations take the essential step of moving from a system focus to a business service focus. To make alignment possible, IT must tie activities and capabilities to something meaningful to the organization and its customers. Having your IT department focused on Agile, ITIL, COBIT […]

  • The hyrbid issue and too many IT tools

    Are Your IT Tools Hindering Your Productivity?

    IT tools are intended to make life easier, more efficient and productive. But often these tools contribute to a lack of focus and challenge an IT department’s ability to inform and empower the business groups they serve. Following are four ways that an organization’s tools may be hindering productivity. Too Complex – Sometimes IT tools […]

  • aligning business and CIO It objectives in the office at a tech company

    Business IT Alignment: Signs You’re Not Aligned

    High on the list of priorities for forward thinking CIOs and technology departments is business IT alignment specifically as they pertain to strategic objectives. C-level executives are more interested in conversations about how IT delivers value to the business and end user than just a technology discussion. However, IT departments often feel out of the […]

  • Designing the cloud for data center resilience. AWS outage .

    Designing for Resilience…It’s Not About the Platform

    Forget about not being able to access critical business applications like SalesForce, Office365, GoToMeeting, ADP or GitHub, can you imagine a world (or even 30-minutes) without access to your favorite social media sites like Twitter, Facebook and Snapchat…some should consider a break but that’s a subject for another day. The recent outage of a portion […]

  • cloud computing compliance, cloud compliance, managed service provider, service level agreement

    10 Cloud Compliance Questions to Ask

    Cloud compliance is an issue at the forefront of IT departments in industries as diverse as financial services, government, healthcare and retail. Regulations and standards including PCI-DSS, HIPAA and SOX require ever-more stringent controls and reporting, leading many enterprises migrating to the cloud or evaluating their current cloud services to seriously question their compliance statures and […]

  • change management during cloud migration, AWS Cloud Migration, cloud project management

    Change Management During Your Cloud Migration

    Every day enterprises around the world begin migrating from on-prem, legacy systems to the cloud. But while cloud migrations certainly are common, they can also be fraught with issues for organizations, departments or individuals that struggle with change. The good news is that the majority of IT departments are accustomed to change management. The bad […]

  • Denial of Service (DOS) Attacks, UCP and ICMP protocols, DNS amplification, Layer 7 Attacks, Cloudflare, DDoS protection

    Making DoS Attacks a Thing of the Past

    Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. Although DoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved to include distributed (DDoS) and, more recently, distributed reflector (DRDoS) attacks—attacks that simply cannot be addressed by traditional on-premises solutions. HOSTING Advanced DDoS Protection, provisioned as […]

  • security

    Security Vs. Compliance – Choosing the Right Mindset for your Organization

    Many organizations seek to demonstrate their security capabilities by adhering to regulatory standards. However, compliance doesn’t always translate into the required standards of security. Simply put, regulations may require a lock on the door, but that does not mean the lock is always in use or that it is the most secure lock for the […]

  • encryption

    Best Practices in Data Encryption

    Strong encryption forms the foundation of present-day data security. The digital world has embraced encryption protocols and practices to establish secure data storage, handling and transmission across local networks and the wider Internet. Business organizations adopting data encryption are expected to keep up with technology advancements in security and raise their game as they move […]

  • shadow-it

    Shadow IT: 6 Steps to Wrestle the Hidden Demons

    Cloud computing has transformed the way IT services are consumed at the workplace. The tedious, time consuming and resource intensive process of deploying infrastructure, installing solutions, integrating systems and learning how to use the solutions is now replaced with the cloud services delivery model. Organizations can simply contact cloud vendors, subscribe to their services and […]