Blog

BYOD Policy Template

Categories: Strategy

The growing ubiquity of computing devices, whether it is a home computer or a personal smartphone, means that more and more staff are using their personal devices to do work. This now common phenomenon often goes by the shorthand BYOD (Bring Your Own Device).

Read more →

SandWorm Vulnerability

Categories: Community IT News

Another security vulnerability is in the news today. This time it’s dramatically called “SandWorm,” an allusion to a creature in the film DUNE. It’s an attack based on a Windows vulnerability that has been used by Russian based hackers to attack NATO, EU, Telecommunications and Energy related computer networks for digital espionage. The security firm iSightPartners identified this threat and worked with Microsoft on the security vulnerability.

Read more →

Better Security through 2FA

Categories: Community IT News

Security breach…yet again. This one is notable for involving personal (in many cases intimate) photos of celebrities being hacked and stolen from iCloud. Apple has released a statement indicating that the hacked accounts were subject to a brute force attack in which a hacker knew the email address and relentlessly tested passwords and secret answers until the correct ones were identified. Regardless of the details, the immediate lesson is that our data and information systems are always at risk of breach. Many of the photos in the celebrity hacking incident date back over 3 years, suggesting that the hacker(s) had access for at least that long.

Read more →

Make the Most of What You’ve Got – Information Systems

Categories: Blog

Many Community IT clients under-leverage information systems already owned by the organization. There are a variety of reasons for this, but foremost among them is that information systems are frequently chosen to meet a particular set of prioritized business requirements, which become the focus of the initial implementation. As time passes, one or more of several conditions can emerge.

Read more →

Why bother with a Network and Security Assessment?

Categories: Blog

We haven’t had any problems. We don’t have anything worth stealing. Our staff knows enough to keep us safe. There are a lot of things we tell ourselves to help us feel safe and secure. But network stability and security is one case where you can’t rely on the old phrase of “what you don’t know can’t hurt you.” The truth is, the more you know, the better. Information and outside expert opinions go a long way to improving things.

Read more →

IT Lessons from the Tour de France

Categories: Community IT News

Any of you who know me probably also know that I’m an avid participant and fan of endurance sports. So with the Tour de France in full swing and my colleague Peter Mirus having recently written about the importance of tenacity in software implementation, it struck me that there’s no better example than the Tour for the importance and value of tenacity for achieving most any goal. And particularly the goal of successfully implementing a new information system.

Read more →

Talent, Time, Tenacity

Categories: Strategy

Each year, Community IT Innovators helps a variety of non-profits assess their business needs and select information systems to support those needs. We frequently find that though clients give a good deal of attention to what the software selection process will entail, they give very little attention (by comparison) to what the software implementation process will entail. Orchestrating a successful software implementation requires developing and managing a number of moving parts and organizational qualities. In this post I focus on three fundamental aspects of a successful implementation: talent, time, and tenacity.

Read more →