Home » 2014 » November
Nov 26

When Does ITIL® Service Transition Come Into Play?

November 26th, 2014 by

ITIL Service TransitionIT services are often dominated by their need for managed change. While such changes obviously manifest in the form of support tickets and user-requested feature upgrades, modifications also keep things running on a day-to-day basis.[...] Read More

Nov 24

Take the Local Animal Shelter Support Challenge from Ashford Global IT

November 24th, 2014 by

Animal Shelter SupportAccording to the American Society for the Prevention of Cruelty to Animals, ASPCA®, there are approximately 7.6 million homeless animals per year and only about 13,600 independent community shelters to care for them. Sadly, about 2.7 million of them are euthanized each year because they aren’t adopted.[...] Read More

Nov 20

Controlling Your Digital Resources: ITIL® Access Management Principles

November 20th, 2014 by

ITIL Access ManagementWhen your consumers entrust you with their data, they do so with certain expectations. They want to be sure that even though they’re turning over vital information, you won’t betray their trust by sharing it against their wishes or carelessly misplacing it.[...] Read More

Nov 18

Why Aren’t You Offering Employees ITIL® Certification Training?

November 18th, 2014 by

ITIL Certification TrainingMany HR professionals and corporate training managers feel that the central goal of workplace training programs is simply to boost one’s organizational skill set. For instance, firms commonly seek out and implement course regimens that help them complete specific projects or prepare for upcoming endeavors, but few actually focus on personal certification.[...] Read More

Nov 14

Understanding Effective Information Security Training

November 14th, 2014 by

Information Security TrainingAs with any exhaustive topic, information security has many nuances, and this can potentially lead to deficiencies. For instance, while you may believe your employees’ qualifications render your organization capable of handling web-based threats that target your public portals, you could be blindingly unaware of how their analogues might impact your seemingly secure Intranet and private hardware.[...] Read More

Nov 12

Don’t Let Poor Grammar Skills Turn You into an Ineffective Business Writer!

November 12th, 2014 by

Female student in lecture classroom webNothing can be more embarrassing than being asked by your manager to write a business letter and he hands it back to you circling all your grammatical mistakes.[...] Read More

Nov 11

Can ITIL® Make Your Service Desk More Capable?

November 11th, 2014 by

ITIL Lifecycle for Service DesksWhy do you incorporate service desks in your IT services? While they’re clearly necessary for fielding consumer complaints and requests, they also play other roles people often overlook.[...] Read More

Nov 10

The CISM Certification

November 10th, 2014 by

In the IT department of an organization, a Certified Information Security Manager (CISM) is the individual who is in charge of information risk management.  He or she is the professional who is involved with the management of IT security processes, the development and management of an information security program, and the management of Incidents which may occur at his or her workplace.[...] Read More

Nov 8

Domains of CISSP: Cryptography

November 8th, 2014 by

The Cryptography domain addresses the principles, means, and methods of disguising information to ensure its integrity, confidentiality, and authenticity.[...] Read More

Nov 7

Is Your BYOD Policy a Hidden Risk?

November 7th, 2014 by

BYOD Security PoliciesIn today’s world, everyone is connected, and your employees are no exception. People want to stay in contact with their families, keep up with personal communication and access the Internet.  Smartphones and tablets have become our constant companions.[...] Read More