Cloud IT Community Week in Review: Information Security and Intermedia
It was an interesting week for the Cloud IT Community as Intermedia COO Jonathan McCormick stopped by to share some insight into the IT Lifecycle in a three-part series of articles.
Kicking things off with “The IT Lifecycle: IT Consultants,” McCormick focused down on crucial aspects of hiring an IT consultant, namely when to hire an IT consultant, how to evaluate one and how to drive successful IT initiatives. According to the article, most companies aren’t likely to even consider hiring an IT consultant early on in their lifespan, but the prospect may make sense when their first major expansion takes place. For more insight into the topic, check out McCormick’s full article.
Part two in this series, “The IT Lifecycle: Appointing a CIO,” looks at when the timing is right to take this step, the traits to look for in a strong CIO, and how to measure the results of hiring a CIO. According to McCormick, timing is crucial when hiring a CIO so this first step is ostensibly the most important. The primary function of a CIO, after all, is to be forward looking for developing and implementing IT initiatives. Brought on board too late, it can be difficult for a CIO to fulfill this duty. As a general rule, earlier is better. For more on this topic, head over to the full article.
In the final part of the series, entitled “The IT Lifecycle: IT Policies,” McCormick discusses the importance of implementing adequate IT policies as early as possible in order to set standards and expectations for employees in terms of the use of corporate technology and managing corporate data. The article also outlines how to lay down the law in this scenario and the importance of communicating the reasoning behind these rules. Read all about it in greater detail by checking out the full article.
In other news this week, the results of a recent survey conducted by Information Security found that at least 90 percent of respondents feel that security is the top concern preventing organizations from moving to the cloud. The belief is that, since cloud providers house information from several organizations simultaneously, a breach targeting one company on the cloud would lead to data from other companies getting stolen as part of that breach.
That wraps up this week in cloud IT, but be sure to check out the Cloud IT Community for more news in the space.