Oct 31
October 31st, 2014 by Frank Good
Think your biggest security threat comes from some ill-defined external source? In reality, the most significant risks originate with simple, avoidable mistakes. The staff you trust to handle your data and deal with your clients’ vital private information on a daily basis may simply lack the understanding to know they’re contributing to vulnerabilities.[...] Read More
Tags: AGIT, Ashford Global IT, BYOD Policies, IT Security, Security Awareness Training
Posted in Security Training and Tips, Comments Feed: RSS 2.0
Oct 29
October 29th, 2014 by Angel Prusinowski
Change is inevitable. Change Management is a process in the ITIL® V3 framework that deals with the processes, practices, and strategies adopted in order to implement changes without disrupting business operations. Changes can be either self-adopted by the organization or a part of the structure due to changes in the IT environment.[...] Read More
Posted in ITIL, Comments Feed: RSS 2.0
Oct 29
October 29th, 2014 by Angel Prusinowski
In the previous article in this series, we discussed setting up the Service Desk as a Single Point of Contact (SPOC) for IT as a logical starting point for ITIL implementation. Now, we will take a closer look at the Service Desk responsibilities and relevant ITIL® processes.[...] Read More
Posted in ITIL, Comments Feed: RSS 2.0
Oct 29
October 29th, 2014 by Mary McKinley
Firms that think they have a handle on ITSM frameworks often make the mistake of believing they don’t need additional consulting. Unfortunately, no matter how well your organization stays on top of changing ITSM methodologies, like ITIL®, it’s critical that you benefit from an outsider perspective.[...] Read More
Tags: Ashford Global IT, ITIL Certification Training, ITIL Consulting
Posted in ITIL, Comments Feed: RSS 2.0
Oct 23
October 23rd, 2014 by Ashford Global IT
Getting your workforce security certified can be complicated, but that doesn’t mean you can let your responsibilities slide. In the process of improving your control over who accesses your own information and how you respond to threats, Certified Information Systems Security Professionals (CISSP®) make it easier to protect your own intelligence and win contracts with other companies who require such credentials in order to business with them.[...] Read More
Tags: AGIT, Ashford Global IT, certified information systems security professional, CISSP Certification Training, Information Security Training
Posted in Security Training and Tips, Comments Feed: RSS 2.0
Oct 21
October 21st, 2014 by Frank Good
ITIL® processes compartmentalize the Service Lifecycle into five broad categories, each of which is further divided into individual processes and procedures. Although the five major process classifications, Continual Service Improvement, Service Strategy, Service Design, Service Transition and Service Operation, are intended to be applied together in a comprehensive fashion, there are finite limitations to corporate education.[...] Read More
Tags: Ashford Global IT, continual service improvement, it training, ITIL Service Lifecycle, itil training, service design, service operation, service strategy, service transition
Posted in ITIL, Comments Feed: RSS 2.0
Oct 17
October 17th, 2014 by Angel Prusinowski
Although most employers appreciate the need for a qualified workforce, some fail to understand their responsibilities in creating one. Your staff doesn’t come certified; it may be up to you to help them earn the credentials required to ensure your projects run as smoothly as possible.[...] Read More
Posted in ITIL, Comments Feed: RSS 2.0
Oct 14
October 14th, 2014 by Mary McKinley
Modern IT training is commonly performed within the framework of an online setting. For instance, professionals seeking individual certifications often choose to pursue coursework over the Internet in order to accommodate their packed schedules.[...] Read More
Tags: Ashford Global IT, itil training, Online IT Training
Posted in General, Comments Feed: RSS 2.0
Oct 10
October 10th, 2014 by Frank Good
Access control is the collection of mechanisms that permits managers of a system to exercise a directing or restraining influence over the behavior, use, and content of a system. It permits management to specify what users can do, which resources they can access, and what operations they can perform on a system.[...] Read More
Posted in Security Training and Tips, Comments Feed: RSS 2.0
Oct 9
October 9th, 2014 by Mary McKinley
Don’t be fooled by the typical Hollywood portrayal of IT security. Even among professionals, there exist common misconceptions about the role that security plays and why it’s necessary. While it’s certainly true that hackers are capable of stealing your valuable business data, the idea that they have to go to great lengths to do so is just television’s way of making the concept more exciting for viewers.[...] Read More
Tags: AGIT, Ashford Global IT, Dark Net, IT Security Training, Silk Road
Posted in Security Training and Tips, Comments Feed: RSS 2.0