Posts

What’s the story? How our manufacturing clients use technology – Part 2

Last month, I got to tour another one of our manufacturing client’s facilities, Jaypro Sports, in Waterford, CT. They are a leading authority for institutional sport equipment and athletic field/facility solutions. This was a great opportunity to see what they do and how they do it!

At IT Direct, we believe that the overarching purpose of using technology is to solve a business problem or to improve efficiency or productivity. In this way, technology can help the business achieve their goals. During my tour, I got to see several areas where technology had really come together to help Jaypro Sports achieve those goals! Read more

What’s the story? How our manufacturing clients use technology – Part 1

I’ve been heading out “into the field” lately to talk to some of our manufacturing clients about what they feel are their most important uses of technology. Read more

Our IT vision for 2019

We are focused on our mission of helping our clients gain a competitive edge from their technology. This year we are looking closely at 3 key areas that are critical to supporting your success. Take a look at this quick video:

The Elephant in the Room Keeps Growing!

 

It seems that no one wants to talk about it, or acknowledge its existence, but the elephant in the room is the continuing and constant growth of ransomware (malicious software designed to deny access to a computer system or data until a ransom is paid).

One of our partner companies, Datto, produces a fantastic yearly report on the global state of ransomware as reported by over 2400 managed service providers (MSPs) around the world. The report is filed with excellent information in a very readable format.  You can download the whole thing here.

If you don’t want to tax yourself with the whole report, below are some of the key points and main takeaways that are important to you and your business: Read more

NIST 800-171 requirements – in layman’s terms

In our last blog post, we gave an overview of NIST compliance and why it is so important. In this blog post, we provide you with a quick, very high-level breakdown of the NIST 800-171 Requirement Families.

Each family falls under one of the three main functions of cybersecurity: protect, detect, or recover.

  • Protect – Protect your systems from harm or intrusion to the highest level possible
  • Detect – Detect when a breach is in progress or has occurred, from either inside or outside your organization
  • Recover – Ensure you have the systems and procedures in place to recover from an incident as efficiently and effectively as possible, while following all legal requirements

There are 14 families of requirements in NIST 800-171. In the NIST Special Publication document, the families are presented in alphabetic order, but it may make a little more sense to divide them into their security function. So, that’s what we’ve done below: Read more

When does 2+2=5?

When does adding two things together equal more than the sum of their parts? When you can take a few pieces of information, put it together, and come to a conclusion that saves you tons of time or resources! This is one of our very favorite things to do for our clients!

How do we do it?
Sometimes multiple helpdesk calls come in and they seem unrelated and may even be assigned to different techs to solve. They may even be quick issues, like difficulty updating a password, or a pop-up that keeps occurring from time to time for low disk space on a user’s computer. To an outside eye, these issues may seem coincidental or completely unrelated. But, our POD teams get to know our clients so well that they pick up on these seemingly unrelated events and can make changes that save everyone time and energy.

Putting it together

One client’s Read more

Life lessons

Life Lessons

Yesterday I went to a conference that was designed for women entrepreneurs to learn from other women entrepreneurs.  It was a terrific event, put on by the Greater Hartford SCORE organization, a volunteer-based national group in which retired executives use the knowledge and skills they gained throughout their careers to mentor small business owners on starting and developing their business.

The panel was filled with five incredible, successful women who enjoyed telling the stories of their businesses, their lives, and all the things they learned along the way. The themes that stood out are important, not only for entrepreneurs, but for all business leaders: Read more

Why Standardize your IT?

A state of (IT) confusion

The CEO has a Dell laptop with Windows 10, the finance guy has a Lenovo desktop with Windows 8, and your office co-worker has a Macbook. Some folks use Dropbox, others use Sharepoint, and still others use Google Drive. Linda has McAfee, Jane has Norton, and Bob has ESET. Alex VPNs into the network, while Sue uses remote desktop.

Does it matter?

These scenarios are all too familiar and you may think, ‘does it matter? All those folks can work, they can all share files, have access to the network, and they all have antivirus protection’. That may be true…but what happens when you need to update, replace, find, learn how to use, or support something. That’s when you’ll be pulling out your hair!

Higher level thinking

Handling your business IT with inconsistent standards is not only costly in terms of time and money but could be potentially damaging to your data and intellectual property in the case of lax cybersecurity standards. Read more

How to get your business ready for the future (part 3) – Business Intelligence

How to get your business ready for the future (part 3) – Business Intelligence

In our previous two digital transformation blog posts we discussed the infrastructure you need before you can digitally transform your organization and we talked about how to change your approach to technology so that it becomes a strategic component of your business. In this blog post, we get to the crux of what digital transformation is all about…Intelligence

At the end of the day, Digital Transformation is all about gaining intelligence on your business that helps you to make better decisions, enabling you to engage and help your clients, empower your employees, optimize your operations, or transform your products.  Read more

Is your IT strategy cohesive across your entire business?

Is your IT strategy cohesive across your entire business?

In a previous blog post, we talked about the role of IT strategy and how it has changed over time. We described how to move up from a Reactive break-fix model and through the IT Pyramid to increasingly use your IT to drive value in your business.

What happens with an incohesive strategy?

Recently, we discovered a case where part of the business was still in break-fix mode, while other parts of the business had moved into higher levels of IT efficacy. Read more