Education Center

Articles, Training, Videos, Tips, eBooks, and More!

Go Mobile - Without Killing Your Data

What if you could tap into the top talent in your industry, no matter where in the world they are? With the power of the mobile web, your all-star team is now – literally – at your fingertips.

Read More
Topics: I.T. Security

Leading With Extreme Ownership: What A Difference It Makes

Earlier this year, my Vistage Group Chair, Don Pierro, introduced me to one of the best business books I’ve ever read.

The book is, Extreme Ownership: How U.S. Navy SEALs Lead and Win, by Jocko Willink and Leif Babin.

As I read through it, I was completely enthralled by the discipline, training, and results that the Navy SEALs are able to achieve while being involved in very real life-or-death situations. It occurred to me that our already darn-good organization might be way better if we applied the principles of Extreme Ownership to ourselves.

Read More

3 Tips To Reduce The Amount Of Spam That Makes It To Your Inbox

According to Talos Security Intelligence and Research Group, a division of Cisco Systems, 86 percent of emails sent worldwide are unwelcome junk mail, or spam. Not only is spam annoying, it can also be dangerous if you or one of your employees accidentally succumb to one of their schemes.

With the prevalence of spam today, not only do you need the right technology in place to keep it under control, you also need to educate your users on how to reduce the amount of spam that you may unintentionally be inviting in.

Read More

What To Do When The Cloud Goes Down

Technology is a great enabler.

Think of all the ways that your business is able to thrive, grow and serve your customers better – ways that didn’t even exist 18 to 24 months ago.

That being said, technology isn’t perfect. For all of the power that these systems bring, software will have bugs, hardware will fail and the Internet will go down. Having a plan for when that inevitably happens is what separates the companies that are able to continue business as usual when the unexpected occurs, versus those that lose productive time due to IT problems.

Read More

Ironman Challenges and Lessons Learned

It’s amazing how sports and life events parallel business principles sometimes.

Two weeks ago, I completed my second IRONMAN Triathlon. It was held in the Laurentian Mountains at Mont-Tremblant Ski Resort in Quebec, Canada, which means I spent MANY hours training in the local California mountains trying to get ready for this extremely hilly course. I trained very hard and was as ready as I could be for the 140.6 mile course.

Well, I finished…but not without some issues that could have been avoided with a bit of planning and situational decision making.

Read More

5 Ways To Spot A Social Engineering Attack

“I’m not going to make payroll – we’re going to close our doors as a result of the fraud.”

Unfortunately, that statement is becoming more common among smaller businesses, according to Mitchell Thompson, head of an FBI financial cybercrimes task force in New York.

The FBI reports that since October 2013 more than 12,000 businesses worldwide have been targeted by social engineering–type cyberscams, netting criminals well over $2 billion. And those are just the reported cases. Often, due to customer relationships, PR or other concerns, incidents go unreported.

These unfortunate events were triggered by a particularly nasty form of cyberattack known as “social engineering.”

Read More
Topics: I.T. Security

The Pros and Cons of Outsourcing IT Services

In today’s digital business world, it’s rare to find tasks that don’t require the use of a computer, tablet, or smartphone. This means that delighting your clients and keeping your employees productive depends heavily on the efficiency and competency of your company’s Information Technology department processes, whether it’s internally staffed or outsourced to a third party.

Read More

3 Major Mistakes Businesses Keep Making With Their IT Strategy

I see it all the time: Businesses create their strategic plan for the year where they lay out their goals and objectives for each department. It’s BEAUTIFUL, yet it gets derailed somewhere along the way and you wonder why these goals aren’t being met, or why it seems like the teams keep running into roadblocks.

Read More

Is Your IT Strategy Insane?

"Insanity: Doing the same thing over again and expecting different results" - Albert Einstein

If I have to put a label on this summer, it would be “Insanity”. 

Over the course of the last few months, my days have been spent meeting and chatting with business executives about achieving higher results from the technology investment they are making.

Read More

Shadow IT: Ignore At Your Own Risk

It’s one of those little secrets that nobody wants to talk about…

The term “Shadow IT” refers to apps and devices used at work that operate outside your company’s sanctioned policies and protocols.

Shadow IT takes many forms, like conversations on Facebook Messenger, Google Hangouts, Gmail or Skype. It can include software from Excel macros to cloud-based data storage apps such as Dropbox, Google Docs and Evernote. Or collaboration spaces like Slack, Asana and Wrike. And then there are devices: USB sticks, smartphones, tablets and laptops within your network that you have no control over.

Robert J. Moore, CEO of RJMetrics, relates how companies like Slack and Dropbox craft their pricing models to encourage rapid proliferation. One day, a few of his engineers were using Slack, then all the engineers, then the whole rest of the company was using it. He said, “We reached a point of no return and paying for it was pretty much our only option.”

Read More
Topics: I.T. Security