Viewing entries in
News

IT Security: 11 Tips to Keep Your Network Secure

Comment

IT Security: 11 Tips to Keep Your Network Secure

As IT professionals, our goal is to remain transparent to the end users of our company.  All too often, while we are trying to keep up with the demands of the environment, we neglect one of the most important elements in IT security: maintenance. When we first design our networks, we design them for security, efficiency, and redundancy. Most of those design elements don’t change over time. But many parts of a network need constant attention to maintain a high level of security. So, what are top eleven tips to keep your network secure?

Comment

Lessons From Megaprojects Can Deliver More Value To Your Business

Comment

Lessons From Megaprojects Can Deliver More Value To Your Business

While megaprojects are appealing for the four sublimes, they often go wrong. According to Dr. Flyvbjerg, 9 out of 10 megaprojects take longer, cost more than estimated, or produce fewer benefits than expected.  Many megaprojects were discovered to have all three of these failures. In spite of these realities, the Megaprojects Paradox, the term invented by Dr. Flyvbjerg, confirms that megaprojects are getting bigger as a percentage of GDP, but delivery is worsening, and stakeholders are less happy.

Comment

Data Security and Your Mindset

Comment

Data Security and Your Mindset

So much is at stake with your personal liability and livelihood.  Because of that, I offer yet another IT blog discussing security. I am sure you see many posts in this genre, but keeping security top of mind is important, so please read on.

On October 5, 2014, CBSNewsreported FBI Director James Comey saying, "There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese" (Pelley, 2014).

Wow!  So that’s it?  Cash in our chips and call it a game well played?  No! Of course not!  IT security is not a one-time deal where we have already won, or we have already lost.  IT security is not a project that got funded last fiscal year and wrapped up before the budget dried up. Security is a matter of vigilance, continuous review, and a critical examination. So what mindset do we need to maintain to protect our investments and livelihoods?

Comment

AfidenceIT Talks Project Management at the Taste of IT

Comment

AfidenceIT Talks Project Management at the Taste of IT

AfidenceIT had the honor of presenting during the 9th annual Taste of IT conference. The Taste of IT represents Technology First’s largest conference of the year. The event took place at the Sinclair Community College Ponitz Center on November 18th, 2015. Over thirty speakers shared expertise on varying topics including project management, software development, Big Data, Cloud, and security.

Calling an Audible: Managing Project Direction and Success when Business Priorities Shift

How do you inspire success when everything changes? How do you react when it’s time to call an audible? Calling an Audible: Managing Project Direction and Success When Business Priorities Shift offered reaction strategies companies should implement when faced with shifting priorities and difficult business decisions.  In today’s changing business environment, project managers must be able to adjust to the repositioning of business goals.

Comment

Potential Data Breach: Over 1000 UC Health Patients May Be At Risk

Comment

Potential Data Breach: Over 1000 UC Health Patients May Be At Risk

Security and compliance are not the same, but they must have a collaborative and mutually beneficial relationship. Shannon Glass, AfidenceIT cyber security expert, was interviewed by WLWT about a possible data breach that affected UC Health patients. WLWT reports that a one letter mix up had the potential of costing UC Health the private medical information of many patients. Diana Lara, UC Health Spokeswoman, explains in the Media Release that UC had to inform 1,064 patients about the "incident involving some of their personal information.” 

Comment

Business Continuity: A Must Have for Business Survival

Business Continuity: A Must Have for Business Survival

As a consultant, I’ve had the good fortune of working with many great companies.  All have high reliance on their technology being available to conduct business.  I have felt personal responsibility to ensure that IT outages do not have any adverse effects on their ability to run the business.  Sometimes this outage avoidance involves preventative investment in their technology environment. At times, it is challenging to balance expenditure on an IT project that mitigates a perceived risk against the cost of that project. The benefits of investment in a technology solution may not always be obvious or seem pressing.

A Smart Way to Think About Strategy

Comment

A Smart Way to Think About Strategy

What allows elite teams in football to be great while other teams struggle for decades? Why do some companies grow and flourish, while others die off? How do you go about readying yourself for your career? How do you afford vacations or to retire one day? In one word: strategy. But what exactly is a strategy? 

Comment

11 Tips to Design a Secure, Efficient, and Scalable Network

Comment

11 Tips to Design a Secure, Efficient, and Scalable Network

A great number of factors need to be considered when designing a secure, efficient, and scalable network.  While individual network demands will vary greatly between networks, it is important to think through your network design. Here are eleven design tips that will make your network secure, efficient, and scalable.

Comment

 Three Classical Assumptions

Comment

Three Classical Assumptions

A study published in Physical Review Letters, by physicists Radu Ionicioiu et al., confirmed “that the three apparently reasonable classical assumptions—objectivity, determinism, and independence—are mutually incompatible with any theory” (Zyga). Lisa Zyga discussed the three classical assumptions in article, Could Classical Theory Be Just as Weird as Quantum Theory? Zyga indicated that “while any two of the three assumptions are compatible, all three are not.”

Comment

The Women of Influence Award

Comment

The Women of Influence Award

Barbara Hogan is the owner and vice president of AfidenceIT. She is the recipient of the Women of Influence award. Barbara was recognized as a woman who shaped the success of AfidenceIT.  The Women of Influence award was given by the editorial team at Venue Media, the publisher of Venue Magazine, Greater Cincinnati’s Lifestyle publication and LEAD Magazine.

Comment

7 Things I Like Best About Windows 10

7 Things I Like Best About Windows 10

Windows 10 is the newest and most powerful operating system from Microsoft. Are you still validating the pros and cons of Windows 10 installation? I’ve recently upgraded, so I wanted to share seven things I like best about Windows 10. According to The Verge, after just four weeks, 75 million PCs had Windows 10 installed (Warren, 2015).  So, what features may be worth the upgrade?

Meet MiP: Taste of IT Robot Giveaway

Meet MiP: Taste of IT Robot Giveaway

One of our featured items at this year’s Taste of IT is a giveaway of a MiP robot toy. Taste of IT conference is hosted by Technology First. The conference is on November 18, 2015 at the Sinclair Community College Ponitz Center in Dayton, Ohio. Taste of IT represents Technology First’s biggest conference of the year. Many attendees have an opportunity to experience MiP in action at the AfidenceIT booth.

Welcome Our New IT Consultant

Comment

Welcome Our New IT Consultant

We are very pleased to announce that Kevin Sholder has joined AfidenceIT. Please help us welcome our new IT consultant. Kevin graduated from the Ohio Institute of Photography with a diploma in portraiture. He spent 12 years in the photographic industry using computer technology to support his profession. This interest in technology led to a full-time position as a technology consultant and project manager at NCR which was the beginning of what has become a 20-year career.

Comment

AfidenceIT Celebrates 5 Years of Service

Comment

AfidenceIT Celebrates 5 Years of Service

Join us this month as AfidenceIT celebrates 5 years of service. AfidenceIT is built on a foundation of honesty, integrity, and strong relationships. Even our name, Afidence, comes from Latin for “joining in trust.” It’s a principle that we live every day. According to Kern (2003), "Values drive behavior and, therefore, need to be consciously stated, but they also need to be affirmed by actions."

Comment

Comment

Welcome Warren County IT Department

Please help us welcome Warren County IT Department! They are a new client for AfidenceIT, and we are super excited about our partnership!

Warren County IT Department manages Department of Information Technology. Their site defines the following as their purpose:

The County Auditor is responsible for the management of the Department of Information Technology and serves as the Chief Administrator of the Automatic Data Processing Board. Changes in computer systems and planning must be approved by the Board to automate various county functions. 

Comment

Comment

Welcome Midmark

We would like to welcome Midmark. In 2015, they became a new client for AfidenceIT and we are excited about our partnership.

  According to their website, Midmark has the following mission and vision:

"Midmark strives to bring efficient patient care to millions of people each day in the human and animal healthcare industries around the world. A leading provider of medical, dental and veterinary equipment solutions, Midmark is focused on continuously improving exam room workflow and enhancing patient-caregiver interactions. Midmark’s more than 1,500 teammates worldwide are dedicated to redefining the future of the clinical space and making a positive difference in the practice of healthcare. Headquartered in Dayton, Ohio, Midmark maintains production and administrative offices in Versailles, Ohio, as well as four subsidiaries in the United States and international subsidiaries in France, India and Italy."

Comment

Making Security Second Nature

Comment

Making Security Second Nature

One of the most difficult jobs in information technology is that of network security engineers. The demands of the work are incredible.  Network security engineers need to be technically gifted to keep up with the breakneck pace of new technologies and vulnerabilities.  They must be ready to put their life on hold to go into work at all hours of the night to remediate security incidents. 

Comment