Blog Archives

When technology creates a risky business

I don’t have to tell you why one person shouldn’t be solely responsible for processing the mail, handling the bookkeeping, signing checks and making deposits. Everyone knows the business risks inherent in solo access to critical information. However responsibilities are … Continue reading

When average is no longer good enough

What’s the bestselling car in the world? The Toyota Corolla—39 million sold through April 2012, according to Toyota Motor Corporation. And it was the first car ever to achieve $30 million in sales. What’s so special about this less than … Continue reading

The accidental CFIO and how to eliminate him

Recently I met with a couple of IT company executives whose target clients happen to include medium-sized enterprises. I mentioned that they must be talking to a lot of CFIOs, but all I got back were two blank stares. It … Continue reading

When an elephant should forget what he learned—and learn something new

Have you heard the one about the elephant? A guy walks by the circus where an elephant is tethered by a flimsy cord. He asks the elephant’s trainer, “How can you keep him tied up with that? He could snap … Continue reading

Why running technology on the break/fix model is a lost cause

“If it ain’t broke, don’t fix it.” That’s a model every business follows now and then. That’s fine if whatever’s unbroken can’t be improved by “fixing.” But if that’s your model when it comes to technology, then you’re missing the … Continue reading

Are you looking at IT the way you look at accounting? Or are you looking for one full-time IT guy with five heads?

  Here’s your overarching IT challenge: handling today’s productivity issues—those things that have “emergency” red-lettered all over them—while proactively preparing for tomorrow. But unless you run IT like you run your accounting department, chances are your IT person is looking … Continue reading

Core vs. Chore – Does your IT professional have the headroom to think about your business?

If you think your IT professional is thinking about how technology can advance your business objectives while he’s rebooting computers, think again. More likely, his mind is focused on checking off the next chore on his to-do list. “I forgot … Continue reading

Defining Remote Managed Services for Portland SMBs

Sometimes, the terms that get thrown around in IT circles aren’t easy to understand. According to a recent survey of SMB leaders by Techaisle, the term “remote managed services” is one of the least understood in all of IT. Managed … Continue reading

IT Security: A New Version of the Dictionary for 2013

Early computer commentators assumed there would never be more than a few hundred viruses. And in 2006, Bill Gates promised that spam would soon be totally eliminated. Yet computer threats continue to pose serious risks to businesses and individuals alike. … Continue reading

What’s in Store for IT Security: Predictions for 2013

Typically, victims of a computer infection don’t realize their machines are “sick” until it’s already too late. For instance, on Oct. 3, 2012, 53 universities experienced unauthorized access to their networks. The group of hacktivists that took responsibility for the … Continue reading

css.php