Managed IT Help Desk: Right for Your Business Part 3

This is part 3 of a 3 part series exploring the value (and even necessity) of a professionally managed Help Desk. The author has over 30 years working as an IT leader with some of the best run companies in the world. He has worked both sides of the fence – as a company IT employee and for outsource providers. He’s seen successful engagements and failures. This experience informs this series.

My intent in writing this series of blog articles is ...

Continue Reading
0

Ransomware:  What You Need to Know

Hundreds of millions of dollars have been paid to cyber criminals since 2013 as ransom to unlock encrypted files. One of the most notorious pieces of ransomware is known as Crypto Locker. Crypto Locker typically arrives in the form of an email link or attachment. Once the email recipient clicks the link or opens an attachment, the Crypto Locker virus is downloaded and begins to replicate itself on the network while encrypting files on the host.

At a point in the ...

Continue Reading
0

Managed IT Help Desk: Right for Your Business Part 2

This is part 2 of a 3 part series exploring the value (and even necessity) of a professionally managed Help Desk. The author has over 30 years working as an IT leader with some of the best run companies in the world. He has worked both sides of the fence – as a company IT employee and for outsource providers. He’s seen successful engagements and failures. This experience informs this series.

My intent in writing this series of blog articles is ...

Continue Reading
0

Four Winds LPGA Tour Event at Blackthorn Golf Club

We would like to cordially invite you to this year’s Four Winds Invitational as a guest of Orion Group as it returns for a fifth year and brings the brightest futures stars of the LPGA. The event will be held Friday June 17th through Sunday June 19th at Blackthorn Golf Club.

As a sponsor of this great local event, Orion Group will have a corporate hospitality tent located along the 18th hole. You and your guests can ...
Continue Reading
0

Managed IT Help Desk: Right for Your Business Part 1

This is part 1 of a 3 part series exploring the value (and even necessity) of a professionally managed Help Desk. The author has over 30 years working as an IT leader with some of the best run companies in the world. He has worked both sides of the fence – as a company IT employee and for outsource providers. He’s seen successful engagements and failures. This experience informs this series.

My intent in writing this series of blog articles is ...

Continue Reading
0

WordPress User? Then you need to read this!

According to Wikipedia, a CMS (content management system) supports the creation and modification of digital content using a common user interface and thus usually supporting multiple users working in a collaborative environment. CMS’s have been available since the late 1990s. WordPress is the most popular CMS and is used on over one-quarter of all websites and over half of all CMS websites worldwide. This popularity makes it a great target for hackers.

Based on its leading market share, attacks on WordPress ...

Continue Reading
0

Custom Application Project- A Case Study

A growing non-profit organization needed to be able to provide a common interface, data input and tracking and access to over 50 regionally distributed offices around the Midwest. Leadership needed a dashboard to view both location-specific and consolidated data to better manage their performance.

Scope, requirements and constraints

  • Map business processes.
  • Identify all relevant data elements and data relationships.
  • Choose appropriate technologies (database and programming language).
  • Develop timeline and cost estimates.
  • Agree on project phases.
  • Identify customer resources, IT, testers and approvers.

Considerations: With no IT staff, OGSE ...

Continue Reading
0

Phishing:  Don’t Get Caught!

A phishing email is an attempt to acquire sensitive information like credit card details or login information for malicious reasons by pretending to be a trustworthy source. Phishing is an example of social engineering techniques used to deceive users, while exploiting the poor usability of current web security technologies. A phishing email message is a form of attack that tries to compel the user to expose information that the hacker can use to gain unauthorized access to system ...

Continue Reading
0

Managed IT: Right for my Business? Part 4

This is the last part of a 4 part series exploring the difference between a one, two or three man IT support model and a managed IT support contract. The author has over 30 years working as an IT leader with some of the best run companies in the world. He has worked both sides of the fence – as a company IT employee and for outsource providers. He’s seen successful engagements and failures. This experience informs this series.

My intent ...

Continue Reading
0

Custom Application Development: A Case Study

A growing non-profit organization needed to be able to provide a common interface, data input and tracking and access to over 50 regionally distributed offices around the Midwest. Leadership needed a dashboard to view both location specific and consolidated data to better manage their performance.

Scope, requirements and constraints

  • Map business processes.
  • Identify all relevant data elements and data relationships.
  • Choose appropriate technologies (database and programming language).
  • Develop timeline and cost estimates.
  • Agree on project phases.
  • Identify customer resources, IT, testers and approvers.

Considerations

With no IT staff, OGSE ...

Continue Reading
0
Page 2 of 6 12345...»