Viewing entries in
In the News

IT Security: 11 Tips to Keep Your Network Secure

Comment

IT Security: 11 Tips to Keep Your Network Secure

As IT professionals, our goal is to remain transparent to the end users of our company.  All too often, while we are trying to keep up with the demands of the environment, we neglect one of the most important elements in IT security: maintenance. When we first design our networks, we design them for security, efficiency, and redundancy. Most of those design elements don’t change over time. But many parts of a network need constant attention to maintain a high level of security. So, what are top eleven tips to keep your network secure?

Comment

Lessons From Megaprojects Can Deliver More Value To Your Business

Comment

Lessons From Megaprojects Can Deliver More Value To Your Business

While megaprojects are appealing for the four sublimes, they often go wrong. According to Dr. Flyvbjerg, 9 out of 10 megaprojects take longer, cost more than estimated, or produce fewer benefits than expected.  Many megaprojects were discovered to have all three of these failures. In spite of these realities, the Megaprojects Paradox, the term invented by Dr. Flyvbjerg, confirms that megaprojects are getting bigger as a percentage of GDP, but delivery is worsening, and stakeholders are less happy.

Comment

Battling Breach Fatigue: The End is Not in Sight?

Comment

Battling Breach Fatigue: The End is Not in Sight?

As 2015 comes to a close, and we wipe our brow from “breach fatigue,” rest assured, the exhaustion is not over. In fact, it’s far from over. Companies are grappling with the increased demand to protect their information and assets from the growing threat landscape.  At the same time, they are trying to manage a shrinking budget and a constant push from the C-suite to do more with less.  This delicate balancing act sounds impossible when trying to secure your company, but with the right focus and support, it can be done.  But first, why do you need security, and how do you approach it more strategically?

Comment

Data Security and Your Mindset

Comment

Data Security and Your Mindset

So much is at stake with your personal liability and livelihood.  Because of that, I offer yet another IT blog discussing security. I am sure you see many posts in this genre, but keeping security top of mind is important, so please read on.

On October 5, 2014, CBSNewsreported FBI Director James Comey saying, "There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese" (Pelley, 2014).

Wow!  So that’s it?  Cash in our chips and call it a game well played?  No! Of course not!  IT security is not a one-time deal where we have already won, or we have already lost.  IT security is not a project that got funded last fiscal year and wrapped up before the budget dried up. Security is a matter of vigilance, continuous review, and a critical examination. So what mindset do we need to maintain to protect our investments and livelihoods?

Comment

AfidenceIT Talks Project Management at the Taste of IT

Comment

AfidenceIT Talks Project Management at the Taste of IT

AfidenceIT had the honor of presenting during the 9th annual Taste of IT conference. The Taste of IT represents Technology First’s largest conference of the year. The event took place at the Sinclair Community College Ponitz Center on November 18th, 2015. Over thirty speakers shared expertise on varying topics including project management, software development, Big Data, Cloud, and security.

Calling an Audible: Managing Project Direction and Success when Business Priorities Shift

How do you inspire success when everything changes? How do you react when it’s time to call an audible? Calling an Audible: Managing Project Direction and Success When Business Priorities Shift offered reaction strategies companies should implement when faced with shifting priorities and difficult business decisions.  In today’s changing business environment, project managers must be able to adjust to the repositioning of business goals.

Comment

Potential Data Breach: Over 1000 UC Health Patients May Be At Risk

Comment

Potential Data Breach: Over 1000 UC Health Patients May Be At Risk

Security and compliance are not the same, but they must have a collaborative and mutually beneficial relationship. Shannon Glass, AfidenceIT cyber security expert, was interviewed by WLWT about a possible data breach that affected UC Health patients. WLWT reports that a one letter mix up had the potential of costing UC Health the private medical information of many patients. Diana Lara, UC Health Spokeswoman, explains in the Media Release that UC had to inform 1,064 patients about the "incident involving some of their personal information.” 

Comment

A Smart Way to Think About Strategy

Comment

A Smart Way to Think About Strategy

What allows elite teams in football to be great while other teams struggle for decades? Why do some companies grow and flourish, while others die off? How do you go about readying yourself for your career? How do you afford vacations or to retire one day? In one word: strategy. But what exactly is a strategy? 

Comment

11 Tips to Design a Secure, Efficient, and Scalable Network

Comment

11 Tips to Design a Secure, Efficient, and Scalable Network

A great number of factors need to be considered when designing a secure, efficient, and scalable network.  While individual network demands will vary greatly between networks, it is important to think through your network design. Here are eleven design tips that will make your network secure, efficient, and scalable.

Comment

 Three Classical Assumptions

Comment

Three Classical Assumptions

A study published in Physical Review Letters, by physicists Radu Ionicioiu et al., confirmed “that the three apparently reasonable classical assumptions—objectivity, determinism, and independence—are mutually incompatible with any theory” (Zyga). Lisa Zyga discussed the three classical assumptions in article, Could Classical Theory Be Just as Weird as Quantum Theory? Zyga indicated that “while any two of the three assumptions are compatible, all three are not.”

Comment

The Women of Influence Award

Comment

The Women of Influence Award

Barbara Hogan is the owner and vice president of AfidenceIT. She is the recipient of the Women of Influence award. Barbara was recognized as a woman who shaped the success of AfidenceIT.  The Women of Influence award was given by the editorial team at Venue Media, the publisher of Venue Magazine, Greater Cincinnati’s Lifestyle publication and LEAD Magazine.

Comment

7 Things I Like Best About Windows 10

7 Things I Like Best About Windows 10

Windows 10 is the newest and most powerful operating system from Microsoft. Are you still validating the pros and cons of Windows 10 installation? I’ve recently upgraded, so I wanted to share seven things I like best about Windows 10. According to The Verge, after just four weeks, 75 million PCs had Windows 10 installed (Warren, 2015).  So, what features may be worth the upgrade?

Meet MiP: Taste of IT Robot Giveaway

Meet MiP: Taste of IT Robot Giveaway

One of our featured items at this year’s Taste of IT is a giveaway of a MiP robot toy. Taste of IT conference is hosted by Technology First. The conference is on November 18, 2015 at the Sinclair Community College Ponitz Center in Dayton, Ohio. Taste of IT represents Technology First’s biggest conference of the year. Many attendees have an opportunity to experience MiP in action at the AfidenceIT booth.

Comment

Welcome Midmark

We would like to welcome Midmark. In 2015, they became a new client for AfidenceIT and we are excited about our partnership.

  According to their website, Midmark has the following mission and vision:

"Midmark strives to bring efficient patient care to millions of people each day in the human and animal healthcare industries around the world. A leading provider of medical, dental and veterinary equipment solutions, Midmark is focused on continuously improving exam room workflow and enhancing patient-caregiver interactions. Midmark’s more than 1,500 teammates worldwide are dedicated to redefining the future of the clinical space and making a positive difference in the practice of healthcare. Headquartered in Dayton, Ohio, Midmark maintains production and administrative offices in Versailles, Ohio, as well as four subsidiaries in the United States and international subsidiaries in France, India and Italy."

Comment

AfidenceIT Now Providing IT Support Services to Buffalo Wings & Rings

Comment

AfidenceIT Now Providing IT Support Services to Buffalo Wings & Rings

Mason, OH—June 12, 2015—AfidenceIT, a technology consulting and services firm, recently announced it will be providing IT support services to Buffalo Wings & Rings®. Buffalo Wings & Rings is a Cincinnati-based sports restaurant. In 2010, the restaurant began rebranding to a club level experience featuring bright, inviting dining rooms, 50+ TVs and chef-inspired recipes, making it the perfect place for socializing with families and fans. The plan is to rebrand all Buffalo Wings & Rings restaurants in the next eighteen months.

Comment

Thermal Imaging Systems

Comment

Thermal Imaging Systems

Thermal imaging equipment has helped save energy and cooling costs. Check out the article published in ICT Today by Matt Hoffman, a senior IT Consultant at AfidenceIT, to learn how you can use thermal imaging systems to audit energy efficiency.

Matt Covers How Thermal Imaging Systems Can Be Used to Audit Energy Efficiency including...

Comment