Category Archives: Business & Governance

TOOLS as a TARGET

While we can generally conceptualize that our businesses and organizations have information that may be the target of rivals, criminals, activists and general troublemakers – we sometimes forget that the tools of our trade can just as readily be the target as well. These “tools” could literally be the tools that serve your business (computer controlled manufacturing devices),… Read More »

Broad Distribution Emails – Don’t Give Away the Crown Jewels

Many of us receive regular emails from various recruiters, as well as groups and associations that we belong to, with the latest opportunity, offer or scuttlebutt from the gang. Thank goodness that email is largely paperless; I often worry that my ancient Celt ancestors were right about worshiping trees, and I’m going to be held accountable to the… Read More »

Virtual Aggregate Threats

Security staff and end-uses in many organizations are quickly coming to grasp the concept of aggregation (where the sum total of information in a database is more valuable, and hence a greater risk/higher security classification, than the individual components. Unfortunately many forget that the data isn’t just in a single database – and “virtual aggregates” which can be… Read More »

“Supplemental” temporary/term employee; the worst of both worlds

Many people seeking employment these days are tempted by the question:  do I want to be an independent contractor or an employee? While the choice has always existed, many organizations are back to promoting a third option:  contractual/term-employee (supplemental) – which may sound good for a short engagement, but could be costing you more than you think. Lets put our roles in… Read More »

Top 5 Consulting Scams

We’ve all heard the stories of the unscrupulous consultant who billed more hours than he actually put into a project; or the consultant who charges high rates for his work, and turns around and outsources the contract to a lower cost consultant or off-shore resource. The truth is there are a lot of other scams going on –… Read More »

Effective Meeting Invitations

So there you are, scanning through the myriad of endless emails in your inbox, as you do each and every morning. And as fate would have it, there they are waiting amongst the email onslaught. Much like young children waiting behind fortified snow hills, snowballs prepared in advance for the unsuspecting character to wander by: the often dreaded… Read More »

FAX and e-mail integration… convergence for the small business

“Convergence” is essentially the joining of multiple information and media streams into one seamless integrated work environment. The integration of customer data/relationship management systems with the telephone system and operator workstation is one example of “convergence” that is taking place on the desktop. It’s often believed that convergence is only for the well- established large company… but there… Read More »

Case Study of IT/Business Misalignment: Web-Branding

Many business leaders view information technology (IT) as little more than office automation: word processing, spreadsheets and presentations.  IT has changed the workspace, and business functions that once were exclusively the domains of experts in those disciplines must now include integration of the new technologies. This is an older article of mine; but the point still remains true… Read More »