Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Phishing 2.0: How to How Stop Cyberattacks Even Pros Can't Catch

The information gap is broadening. According to Ivanti’s 2023 Press Reset cybersecurity report, over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing incident in the last 24-months – despite virtually every organization getting phished in 2022!

10 Ways Your CMDB Influences ITIL Success

The Information Technology Infrastructure Library (ITIL) Service Asset and Configuration Management process, described in its Service Transition guide, requires IT organizations to establish and maintain a configuration management database (CMDB) to keep track of configuration items (CIs) and the relationships between them. An up-to-date and functioning CMDB is one of the most important indicators of ITIL implementation success.

Five Ways Voice Picking Raises Accuracy in Supply Chain Operations

Accuracy in supply chain operations means so many things. There’s the obvious order accuracy in fulfillment, and all that comes with it — KPIs met, customer satisfaction ratings, etc. Every one of these is important. But there are several ways that improving accuracy affects the business, so we’re looking at how operations teams hit the target with help from voice-enabled applications.

5 Reasons Why NIS2 Directive Preparation Should Start Now, Part One: Audits Take Time

You probably heard about the European Union’s updated Network and Information Security Directive (NIS2). This directive will translate into active law in October 2024. You should be ready for it, as there are high fines and sanctions for non-compliance. But you might be tempted to think that October 2024 is far away, right? Think twice. After all, how can you know if you have plenty of time to prepare if you don’t know how well you currently comply with the projected regulations?

5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time

In a previous blog post, I discussed the two main areas to audit before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Specifically, these audits would: Identify your gaps with the NIS2 directive’s requirements now. Review your current supply chain security flaws. Now that we’ve discovered these security flaws, we must fix them — before time runs out in October 2024.

Get IT Right by Focusing on Service Strategy

Too often, we in IT get so busy performing the day-to-day work and fighting the many fires that come at us each day that we neglect to take a moment and focus on ways we can be strategic about how we do our jobs. When building or expanding IT Service Management offerings, it’s important to understand how taking time to focus on service strategy can greatly improve the efficiency of service delivery. First, let’s begin by defining a few terms.

How to Avoid These Two Common Monthly Patching Problems

It’s here — that time to patch your endpoints. Maybe it’s something you enjoy, but my guess is probably not. Patching can be a brutal task, and with many organizations still doing it manually, they’re spending more time and resources on patching than anyone really wants to think about. Now, given the fact that you are going to spend all that time and resources on patching, you want to make sure it goes smoothly.

Mapping IT Services for Improved Alignment Between Business and IT

Running a business in today's digitalized world comes with many challenges, such as industry regulations, escalating costs as businesses grow and continuity planning. To effectively manage IT services and align them with business goals, organizations are turning to service management solutions to optimize their resources, budgets and cross-functional collaboration.

Capitalizing on the Cloud: Five Strategic Benefits of ITSM in the Cloud

Cloud computing is no longer the future; it’s our reality. This means that the decision to move ITSM to the cloud isn't just an option. It's a strategic necessity. For business and IT leaders in the early stages of this transformation, understanding the benefits of cloud-based ITSM is pivotal. Here are five advantages that this shift can bring to your organization.