• Aug 31
    2016
    Conventional wisdom suggests that cloud computing offers several technical advantages over traditional IT systems: scalability simplified management reduced maintenance increased reliability But let’s face it. The most powerful advantage isn’t on that list. What advantage is that? The bandwagon. As a trend, cloud computing is at a dangerous point for many businesses — the point that the non-adopters realize they are being left behind. This is when a kind of ...
  • Aug 23
    2016
    The message that IT pros need to understand cloud computing as a discipline rather than as a proprietary platform seems to be catching on. A recent article in InformationWeek titled “9 Cloud Skills IT Pros Need Now” suggests there are tools and technologies that transcend vendor-specific platforms. The article says IT departments need to master these tools and technologies even if they do no cloud development at all but are ...
  • Aug 16
    2016
    A couple months back, I discussed with you the BEC, or “business email compromise,” scam. According to an FBI alert, “The schemers go to great lengths to spoof company e-mail or use social engineering to assume the identity of the CEO, a company attorney, or trusted vendor. They research employees who manage money and use language specific to the company they are targeting, then they request a wire fraud transfer ...
  • Aug 02
    2016
    The threat to your organization of a data breach is real, as are the limitations of pure technology in protecting you. Of the top six sources of cybersecurity error, four of them… general carelessness failure to get up to speed on new threats lack of expertise with websites and applications lack of expertise with networks, servers, and other infrastructure …can only be cured with training. You would think that employing ...
  • Jul 29
    2016
    In the 1989 film, Field of Dreams, an Iowa corn farmer named Ray Kinsella hears a voice telling him to build a baseball diamond in his field. Ray builds the field, and the spirit of legendary ball player Shoeless Joe Jackson turns up to play on it. He even brings many of his friends. By watching their games and interacting with the legendary players, Ray is able to come to ...
  • Jul 20
    2016
    Cybersecurity is more than a technical operation. It is a human undertaking, and its failures lead to human cost. Few events illustrate this better than the Ashley Madison hack, which I blogged about almost exactly one year ago. Ashley Madison, you may remember, is the dating site that facilitated illicit connections for married people. Its notorious slogan was “Life is short. Have an affair.” It is a sign of the ...
  • Jul 12
    2016
    On this blog lately, I have been trying to make the case for vendor-neutral cloud training. Vendor-neutral cloud training, of course, can help your organization embrace the best practices in cloud computing in a way that vendor-specific training probably can’t. Vendor-neutral training can also help you build the expertise your organization needs to evaluate cloud providers and ultimately avoid vendor lock-in. If you are persuaded that vendor-neutral cloud training is ...
  • Jul 07
    2016
    I see four big business challenges in moving to the cloud: 1. Selecting a Vendor. There are lots of cloud providers, and each offers its own unique blend of services, stability, and commitment. Whatever vendor you choose, you’re going to have a partnership with them that is likely to be more intimate than almost any other vendor relationship you’ve had. You need to find a vendor whose service complements your ...