Posts

Efficacy of technology – can technology meet everyone’s needs?

Efficacy of technology – can technology meet everyone’s needs?

During a recent meeting with a prospective client, a CEO of a growing manufacturer in Connecticut, he described what he was looking for in technology in terms of efficacy.

Efficacy – the ability to produce a desired or intended result

I thought this was an interesting way to describe what he was looking for – efficacious technology. It leads to the question…what is your desired result? I think he chose this word, because this answer will be different for every single individual in an organization and is entirely dependent on their role. Yet, the request remains that technology be efficacious, or leading to results, for everyone.  Read more

Top 5 ways to prepare for a ransomware attack

Ransomware attack!
A top cybersecurity threat for businesses today is ransomware – a type of malicious software designed to block access to a computer system until a sum of money is paid. In fact, 12 Connecticut state agencies were just attacked with ransomware, with 160 computers affected. Luckily, the attack was thwarted by the state’s excellent multi-layered cybersecurity strategy.

Your business needs to be prepared too. And just like the state of CT, the multi-layered approach is the best way to do it.

Here are the top 5 ways to prepare for a ransomware attack: Read more

How to get your business ready for the future of IT (part 2)

In our first digital transformation post, we talked about the basics of digital transformation…what it means, how you prepare for it and the importance of a strong and secure infrastructure. If you missed that article, click here to read it.

In this post, we’ll talk about how the role of IT in business has changed over time and how your business approach can change along with it.

The IT Management Pyramid

The pyramid below describes the efficacy of your IT strategy as it improves and develops on the way to Digital Transformation. The goal is to move up the pyramid! The idea is to be continually thinking about how you use IT, the role of IT in business strategy, and where your IT is focused. Each tier of the pyramid is explained more fully below, along with the limitations and benefits of each stage as your business develops its IT strategy. Read more

3 Manufacturing Technology Trends for 2018

Your manufacturing facility may look very different in the years to come. The technological changes that started just a few years ago are becoming readily available and more affordable in 2018. It’s time to start thinking of how you, too, can take advantage of Industry 4.0, aka the “smart factory”. Your company could become more efficient and your employees more productive when you take advantage of some of the technology that is changing the manufacturing industry. Read more

NIST compliance: it’s just good cybersecurity practice

NIST compliance

We all know that cybersecurity risks are not going away. The truth is, they’re only getting worse. Cyber-criminality is an industry, with a lot of money to be made. And as we’ve seen from the news about security breaches lately, they’ll take just about anything they can get their hands on!

The government has a plan!

Hmm…that sounds a little scarier than it is and not completely accurate. The National Institute of Standards and Technology (NIST) is a government agency responsible for maintaining cybersecurity standards for all government agencies. As you may know, they have created a set of standards for non-governmental organizations that handle Controlled Unclassified Information (CUI), NIST 800-171. They’ve created the standards, now you have to create the plan.

What is NIST compliance?

Read more