Upload
suzan-pitts
View
212
Download
0
Tags:
Embed Size (px)
Citation preview
“Finding and using applications to get more work done in less time”
5
“Using newer web technologies like Twitter, Facebook”
“Reaching out and connecting to more people who would benefit from our service”
Virus / Spyware Protection
Software Maintenance
Backup / Restore Systems
Security
Technology Policies
24
Windows / Apple Updates
◦ Critical Updates
◦ Recommended Updates
◦ Hardware / Driver Updates
Software Updates / Patches
26
Backup methods◦ Optical Media (CDs, DVDs, BDs)
◦ Tape
◦ External Drives (Hard drives, Flash)
◦ Online
3 Rules◦ Rotate media & keep off-site
◦ Schedule & automate
◦ Test your backup regularly
27
Physical location – “lock it up” Unauthorized access via network ports Unneeded services – Servers &
Workstations Alternative web browsers Encrypted start-up / logins / passwords VPNs Wireless security
28
User Guidelines Acceptable Use Policy
◦ Computer use
◦ Other technologies / equipment
◦ Personal property
◦ Passwords
◦ Privacy
◦ Consequences
29
“Information technology and telecommunications hardware, software and services turns out to be a powerful driver of growth, having an impact on
worker productivity three to five times that of non-IT capital (e.g., buildings and
machines).”
31
Atkinson, Robert D., and McKay, Andrew S. Digital Prosperity: Understanding the Economic Benefits of the Information Technology Revolution. The Information Technology and Innovation Foundation, 2007.
1. Identify the need
2. Build on what you have
3. Talk to colleagues
4. Define your decision criteria
5. Define your decision-making process
6. Comparison shop
32
Business Process Management (BPM)
Strengths, Weaknesses, Opportunities
and Threats (SWOT)
Getting Buy-In
Measurable Outcomes
34
Gary J. HiresPO BOX 81196Midland, Texas 79708432.520.7137 home432.349.4398 [email protected]
www.hiresconsulting.com
66