Skip to main content

Posts

Showing posts from March, 2018

Enterprise technology's juxtaposition, complementarity and application

The ability to see within an enterprise with operations requiring various technologies in information, communication, operational, security and compliance, or two or more of these, finds stakeholders, or the need to adjust techniques and make, some ingenious ways to be more effective in their responsibilities and deliverables or production. Enterprise technology is not an area and language to be used where there are only some specializations involved but which still within the confines of information technology. IT may have been serving utility operations or energy generation for sometime already and yet stakeholders cannot see how to work hand-in-hand to increase their own efficiency, and the output for which customers are very dependent. There are efforts but they remain completely separate and the result is the bigger realizations and concerns about costs rather than creation of value from the start, not just when profits began to come in. If IT is not clearly use in such environmen

IT risks not managed, maybe violated further

It is, when you do have one or more of the following-- IT policies and procedures doesn't reflect real processes, efforts are workarounds and communications ill-defined or strict without the best of reasons. No access verification and monitoring. Shares and lends credentials, computers and gadgets to each other. Browsing unconsciously, and wandering in, the Web. Opened emails that came from unknown individuals or sender very often without questions. Too much of a trusting person online. Uses the same flashdrive, borrowed or owned, for home computer and office computer. Update platforms and software irregularly. Very proud or dislike to cooperate with colleagues and friends or confident lone wolf. IT people enjoys computer games, doesn’t talk to business people. Risk not attended by IT and/or security people themselves. Mad and disruptive personalities and no respect for rules and regulations. Dismissive of, or no regard to, security protocols. Inattentive to security events. Expens