I am always astonished by the number of organizations I encounter that are not in compliance with the HIPAA Security Rule (45 CFR Parts 160, 162 and 164). If you are running a County government, for instance, there is a high probability that one or more of your departments are covered entities and have
The Problem Here is a scenario I frequently encounter in organizations. An executive identifies a problem which he or she believes to be an Information Technology problem and delegates the problem to the IT Director to solve. For instance, one real-world example I have seen many times is where an executive tells the IT
Establishing Goals, Objectives, and Criteria for Success may be the most the most important component of your project. How will you determine whether or not the project is successful if you don’t clearly plan for and enumerate your goals? Your Enterprise Project may be an undertaking that requires several years from inception to completion.
Is your information secure? Are your organization’s information assets absolutely secure? Do your staff and contractors assure you that everything is safe? How do they know? And how about all those paper files? Is confidential data appropriately labeled and stored in a secure, locked and monitored facility? How do you know? How would anyone
It is fun to pretend there is a Santa Claus when your children are young. Even the most curmudgeonly person can get a warm feeling from the jubilant innocence and wonder shining out of those big eyes at the thought of Santa Claus. I have observed many adults who believe in Santa too. I
Does your IT Staff deliver amazing customer service? Do your staff members love your Information Technology Department? If they had a choice, would they choose the in-house staff or would they rather call a contractor? Does your IT Director produce monthly reports on staff productivity and proudly share these reports with your management team?
If you improve the quality of your product or service, productivity is automatically increased and costs go down. I first learned about W.E. Deming while I was in graduate school and also working in the Product Engineering department of a Fortune 500 company. At the time, the company was implementing Total Quality Management (TQM)
I have been experiencing a frustrating time during the last several weeks dealing with a couple of vendors who don’t want to provide a Statement of Work (SOW)) along with the other contract documents in order to finalize the deals. They keep coming back with something that is less than what I asked for
What difference does it make? Does it matter who oversees IT? Is there a different outcome if the CIO or IT director reports to a CFO, a COO or a CEO? You bet there is. It really depends more on the individual than the position, but let’s stereotype and make some sweeping generalizations –
Eons ago, in a former incarnation, I dated a woman who was working on a master’s degree in education. I recall one discussion where she explained a core component of modern education theory: certified, professional educators can teach any subject, regardless of whether or not they know the subject. Hmmmm. Do you buy that
Angela Hewitt is my favorite Bach performer on the piano and I have listened to her recordings of the Well Tempered Klavier hundreds of times. I recently heard Sir Andrass Schiff’s performances of the D Minor Prelude from Book 1 and was stunned. Even though I play it, I didn’t initially recognize it.
This is a test. Which of the following are common occurrences during IT Management Audits? 1. Staff members quit. 2. Staff members break down in tears in front of the consultants. 3. Staff members fly into a screaming rage at the consultants. 4. Staff members lie to the consultants. 5. Staff members refuse
Cybersecurity, risk, and liability in local government In this 28-minute video, I comprehensively cover the landscape of information security and cybersecurity in local government.
The Cybersecurity equation is so simple that I am always amazed at how often organizations get it wrong. Here it is: Why do so many organizations get it wrong? In many organizations, the equation is simply CYBERSECURITY = TECH. This is the wrong formula and it generally leads to disaster. I was talking to
Enterprise software procurementEnterprise Software Procurement So, you are looking for new enterprise or departmental software or some other type of major system. Maybe you are looking for a new ERP system, an EHR, a 311 system, or an EDMS? Maybe you need a major hardware upgrade as a solo project or as part of