Tech Thursday: The Ins and Outs of IT Leadership

In the last few articles, we’ve discussed how to build an effective IT team that will help your business to grow and succeed. But your team will also need effective
leadership -- managers, directors, and executives who can chart a path for your IT department that keeps your business competitive.

Tech Thursday: How To Staff Your IT Department Strategically

In our last two articles, we covered the various roles that make up an IT department. However, a small or even mid-sized company cannot fill all of these roles immediately. So, the question comes up: As my company grows, how can I strategically fill these IT roles to best utilize the resources I have?

To answer that question, we’ll first examine how IT departments tend to grow organically, and how that can bog down your company with ineffective technical solutions.

Tech Thursday: How To Implement Your IT Policy

Last week, we talked about the importance of developing a unified IT policy, and putting that policy down in writing. With a bit of work and patience, you can make sure that other managers, department heads, and the executive team understand and support the policy decisions.

Tech Thursday: How To Develop a Unified IT Policy

As your organization grows, you may find yourself growing from an IT department of one to working with a small team -- or more. With that growth will come the need to document processes and procedures that were previously ad-hoc, or “oral tradition” -- answers given in the moment in response to one-off questions.

Tech Thursday: What is the DoD Cybersecurity Maturity Model Certification (CMMC)?

In June 2019, Dawn Greenman of Johns Hopkins University and Liz Hogan of E-N Computers sat in on a briefing. The Department of Defense announced that it is introducing a new cybersecurity standard for contractors -- the Cybersecurity Maturity Model Certification (CMMC). With cyberattacks and cyber-warfare in the news week after week, it’s no surprise that the Department of Defense is ready to take a harder line on enforcing cybersecurity standards for defense contractors handling sensitive information.