Newsletter HomePrevious articleNext


Newsletter Topics

  • Business Environment Changed - IT Impact Infrastructure Matters
    • Tape Backup of E-Mail is Not Sufficient
    • Mobile Devices Source of Major Data Breaches
    • Record Management - Retention - Destruction

Business Environment Changed - IT Impact Infrastructure Matters

IT Service ManagementTape Backup of Email Is Not Sufficient

Users demand 24 x 7 IT service availability via web sites, portals, email, and mission critical applications. When these systems and applications are not there or are operating in a degraded mode, it negatively impacts the reputation and revenue of an enterprise.  Maintaining availability and preventing downtime begins with the successful deployment of network and system management solutions that are focused on IT Service Management in a Service-Oriented architecture.

When managing the help/service desk in an IT Service Management environment (ITSM) with Service-Oriented Architecture (SOA), there are five (5) things that you need to do.  They are:

  • Validate that you have implemented service tools versus having added unnecessary overhead and bureaucracy
  • Survey your users often and understand what they do not like
  • Implement metrics and track performance over time
  • Determine the cost of a service solution and its ROI before you implement it measure achievement
  • Encourage input from your users

Read OnOrder Now


Record Retention Periods

Mobile Devices Source of Major Data Breaches

It is estimated that over 250,000 cell phones were lost in airports. Add to that over 20% Smartphone users have a list of their userids and passwords on Smartphones.  When professionals leave a company, they could depart with a significant amount of confidential information on their mobile devices and removable storage cards.  Given the current economic conditions, disgruntled ex-employees pose a particular risk. While reorganizations or layoffs are not everyday occurrences, enterprises could protect themselves from retaliatory activities if IT could wirelessly erase the data on multiple devices instantly or at a time of their choosing.

If a Smartphone or other mobile device with confidential data is lost or stolen, the enterprise is at risk from the loss or misuse of the information stored on the device or its removable storage card. More often than not, basic security mechanisms such as a password to power-up the device or data encryption are not utilized. As a result, the enterprises data on lost or stolen devices is exposed to potentially unauthorized viewing.

Read OnOrder Now


IT Service Management

Record Management - Retention - Destruction

The Record Management, Retention, and Destruction is a detail policy template which can be utilized on day one to create a records management process.  Included with the policy are forms for establishing the record management retention and destruction schedule and a full job description with responsibilities for the Manager Records Administration. 

Read OnOrder Now