Want To Botch A Situation? Take A Page Out Of The New England Patriots’ Disaster Recovery Playbook For Deflategate

disaster recovery

We are all sick of talking about it, but deflategate has the oft-accused New England Patriots on their heels once again. With six Super Bowl appearances, they are this century’s most successful franchise, but periodic accusations of malfeasance threaten to tarnish their legacy. What we didn’t expect was for the Pats to handle this latest round of accusations - namely “deflategate” - so “spectacularly.” We all have something to learn from their “innovative” and “ingenious” disaster recovery plan that enabled them to “successfully” navigate their latest crisis. So let’s take a page out of the New England Patriots playbook for disaster recovery and see how we, too, can royally screw up a sit … Read more

6 Key Information Technology Outsourcing Considerations for CIOs To Avoid “Gridlock”

information technology outsourcing

I’ve been on the buyer side of the information technology (IT) outsourcing equation, so I know how it works. The majority of the time, companies reduce selection criteria to a commoditized IT services grid. In such a grid, services are put along one axis and potential vendors along the other. Services are checked off, and the vendor with the most checks (and the best price) wins. The assumption, of course, is that packaged or pre-defined services are all that matter. Unfortunately, falling prey to “gridlock” often means that a company has missed out on discussing other important aspects of an IT solution … aspects that cannot be neatly docketed in a services grid. This omission often results … Read more

The Internet Of Things Has A Growing Number Of Cyber Security Risks

cyber security risks

Is there anything that can’t be connected to the Internet? For example, where I once wore a $10 pedometer clipped to the waistband of yoga pants, I now wear a $130 fitness tracker on my wrist. In the past, I just took a look at the numbers on the pedometer to see how many steps I’d taken; now I need to log onto an app on my smartphone to see how far I’ve walked and how many calories I’ve burned and even how well I’ve slept. Or, if I wanted to, I could turn on any light in the house from the comfort of my couch rather than get up and do so manually. And that’s just a small scratch on the surface of the phenomena that is known as the Internet of Things (IoT). However, if we know that virtua … Read more

When It Comes To The Cloud And Technology, CIOs Should Understand What Got You Here, Will Get You There

the cloud and technology

Marshall Goldsmith, an executive coach to the corporate elite, is the author of the very popular book called What Got You Here Won’t Get You There. And while the title may be true as it relates to your individual career path, I have news for C-suite executives everywhere: it is not true when it comes to adopting the cloud and technology. In fact, what got you here – to your current state of success – is precisely what will get you to the next level. The problem is, as CIOs and IT professionals, we sometimes allow ourselves to be pressured into acting contrary to what we know is the right thing to do. Here’s what happens. A CEO approaches a CIO and says (in a nutshell), “What’s our cloud stra … Read more

A Movement Is Needed To Improve Cyber Security For Medical Devices

cyber security

At the 2011 Black Hat cyber security conference, a diabetic man named Jerome Radcliffe showed how someone could hack into a wireless insulin pump. Medical devices are just the latest in a growing list of Internet of Things that are at risk for potential hacks. On the surface, it may seem almost foolish to worry that some stranger will want to control a person’s insulin dosage or shut off a pacemaker or manipulate health data, but we also wondered why anyone would want to hack into cloud storage to steal compromising photos of actresses or someone would stage a major attack on an entertainment company in retaliation for a movie. If something can be hacked, it will be hacked. If for no other … Read more

Does Your Information Security Program Depend On Gut Reactions?

information security program

“Go with your gut!” is a phrase spoken in business every day. Many executives responsible for information security programs have learned to trust their intuition and lean on it for both minor and major decisions. After all, not everything can be quantified neatly. The human factor and personal experience can never be (and should never be) completely removed from any business equation. Here’s the problem: when it comes to information security (IS) programs, businesses are too often only going with their gut. Do that, and you’re likely accepting an uncomfortable amount of risk for your organization. Here’s why. Assumptions are deadly Gut feelings are based largely on assumptions. Some … Read more

How To Understand Your Disaster Recovery Services Bill

disaster recovery services

I got my electric bill today and read the line “Total Current Charges” (which, when I think about it, is a terrible pun!). Did you ever flip the bill over to read what goes into those “current charges?” For instance, there’s the generation charge, transmission charge, carbon offset fee, energy efficiency fee, working capital fee, governments taxes and fees. There are even more factors that contribute to the bill, but that’s enough to make my point: when I pay for electricity, I’m paying for a lot more than just the kilowatts of energy necessary to light and heat my home. The same is true when it comes to disaster recovery services, but companies sometimes forget that fact. They want a back … Read more

The Top 5 Traits of Successful Digital Enterprises

digital enterprise

Ecommerce is expanding significantly, with U.S. online sales expected to grow from $263 billion in 2013 to $414 billion in 2018, a compound annual growth rate of 9.5 percent, according to Forrester research. This is pushing the need for businesses to continue to transform their business processes, technologies and even organizational structures, and to become “digital enterprises.” Digital enterprises are those organizations who integrate new technology and business models that engage digital customers at every point in the customer experience lifecycle. Now, it’s becoming essential that organizations embrace digital changes to stay competitive. “For businesses to be competitive durin … Read more