IT Starts with Strategy

Learn how technology can maximize your business with a comprehensive IT strategy and support plan.

Stephanie Hurd

Blog Feature

Employee Retention | Technology Strategy | Threat Prevention | Disaster Recovery | Devices

By: Stephanie Hurd
August 15th, 2019

I'm currently re-watching The Office (US) for what feels like the 100th time. This time, I realized that some parts have a whole new meaning now that I work for an IT company that provides tech support to businesses like the fictional Dunder Mifflin Paper Company. In this clip from Season 7, Episode 9, "WHUPF.com," Jim tries to reset the server after a power outage causes it to go down. He's stuck and The Office can't do any work since he doesn't know the password to sign into the server. This causes Michael to recall all of The Office's former IT guys to determine who originally set up the server. As Michael thinks through the list of IT guys backward from the most current by the nicknames he gave them, "Glasses, Turban, Ear Hair, Fatty 3, Shorts, Fatty 2, Lozenge, and Fatso," Kevin remembers that 'Lozenge' set up the server eight years ago. Michael recalls that whatever the password was made him laugh when he heard it but, "Pam got really offended." Jim ultimately enters Kevin's suggestion of "big boobz," based on Michael's clues. The password is accepted, the server is reset, and Dunder Mifflin lives on to sell paper another day.

Blog Feature

HIPAA | Business Strategy | Cybersecurity | Threat Prevention

By: Stephanie Hurd
August 12th, 2019

On June 6, 2019, Presbyterian Health Services, a health care system and health care provider in New Mexico, discovered a potential breach of protected health information (ePHI). You might assume that a hacker breached their firewall or snuck into their network undetected. That was not the case. The breach occurred because well-intentioned employees fell victim to a phishing email.

Blog Feature

Technology Strategy | Business Strategy

By: Stephanie Hurd
July 29th, 2019

Think of your business’ domain name as your own, branded corner of the internet. It is the space you own for business-related web and email traffic.

Blog Feature

Technology Strategy | Business Strategy | Outsourced IT Support

By: Stephanie Hurd
July 25th, 2019

Welcome to the third and final installment of our three-part series demonstrating the types of services you should expect from a quality outsourced IT vendor. Part I outlined the support you should expect from a help desk and service team, and Part II showed how your IT vendor should advise on business strategy. Now, we’re featuring the third element of service provided by an outsourced IT vendor, project management and implementation. Part III: Project Team Projects are pre-planned, scheduled activities, like new device installation, software migration, cabling, etc. This role might be filled by the same team that handles your day-to-day support. However, when you’re evaluating an IT partner, it is important for you to understand how they maintain the capacity to respond to daily requests while meeting their pre-scheduled project commitments.

Blog Feature

Technology Strategy | Business Strategy | Outsourced IT Support

By: Stephanie Hurd
July 25th, 2019

In Part I of this series we outlined the Service Team component of an outsourced IT vendor. The Service Team tends to see the most day-to-day activities from clients since they handle incoming help desk calls and emails. They resolve issues remotely or on-site at the clients’ locations. Plus, they proactively monitor and maintain client networks to address as many potential issues as possible before end-users ever notice a problem. As you evaluate the benefits of working with an outsourced IT vendor, you’ll want a good understanding of the process for requesting assistance and their guaranteed response and resolution times. Additionally, you’ll want to understand what proactive steps the team takes to resolve issues before they impact business processes and productivity. But it doesn’t stop there - the Service Team is just one component of the relationship you’ll have with a quality IT vendor.

Blog Feature

Technology Strategy | Outsourced IT Support

By: Stephanie Hurd
July 23rd, 2019

You've reached the point where you know your business needs some more sophisticated IT support than your current model can provide. You've evaluated the options, and are considering working with an outsourced IT vendor or managed service provider. An outsourced IT vendor can handle a lot of different functions for your business, but you're struggling to evaluate the return on the potentially significant investment you're about to make in their services.

Blog Feature

By: Stephanie Hurd
June 27th, 2019

Kelley Earnhardt Miller, Co-Owner / Vice President / Business Manager, of JR Motorsports, recently joined her brother, Dale Earnhardt Jr. on his Dirty Mo Podcast, to talk about childhood memories growing up together while their dad, Dale Earnhardt, was becoming a NASCAR racing legend. Before the conversation got started Kelley briefly described her ongoing IT problems and uttered a sentiment shared by many executives unnecessarily suffering from unproductive technology.She said, "everybody has IT problems.” It doesn’t have to be that way, Kelley!

Blog Feature

Technology Strategy | Outsourced IT Support

By: Stephanie Hurd
June 26th, 2019

Gone are the days of Nick Burns Your Company’s Computer Guy showing up at your desk shouting, “MOVE,” so that he can sit in your chair to solve whatever computer issue is keeping you from your work.

Blog Feature

Technology Strategy | Business Strategy | Outsourced IT Support

By: Stephanie Hurd
June 20th, 2019

Most businesses launch their operations on a shoestring budget and manage the business on readily available technology.

Blog Feature

By: Stephanie Hurd
June 14th, 2019

"I'm having technical difficulties," is a phrase with which most professionals are all too familiar. While no IT system is ever 100% free from the occasional issue, the most successful business tech support professionals are the ones that keep business downtime to a minimum and implement IT systems that contribute to the company's bottom line. They know that the only effective way to minimize downtime is to proactively troubleshoot IT systems and fix issues BEFORE they cost the company money by impacting end users. Network monitoring systems are a tool that IT professionals use to stay ahead of issues. These tools allow your IT team to work behind the scenes fixing problems you didn't even know you had to keep the business network running smoothly. Your internal IT department can utilize a network monitoring system, or you can work with an outsourced IT vendor or managed service provider that provides a network monitoring service. Network monitoring is an automated piece of network management that audits all network components (servers, firewalls, shared resources, etc.) for failure and optimum performance. A network monitoring system notifies the network administrator of failures that have impacted or could impact the performance of the entire network.