IT Starts with Strategy
Learn how technology can maximize your business with a comprehensive IT strategy and support plan.
Cybersecurity | Threat Prevention
By:
Stephanie Hurd
October 6th, 2019
You use password-protected applications for everything from banking and financial management to planning vacations and socializing. In the workplace, sign-in credentials connect you and your employees to business applications and online services like payroll processing, appointment scheduling, invoicing, and every other confidential function of your business.
By:
Stephanie Hurd
September 23rd, 2019
Innovative has much more to offer than just our technology and business expertise. We proved that last Thursday when our team put their blood, sweat, and hopefully not too many tears into cleaning 103 historic gravestones for the Sharpsburg Historical Society during United Way of Washington County's Day of Caring. We learned a lot about cemetery preservation and were assisted and trained on proper stone cleaning techniques by Robert Mosko and his crew from Mosko Cemetery and Monument Services. Here, Robert gives us a demonstration of how to properly clean a gravestone with just water and a scrub brush.
Technology Strategy | Business Strategy | Outsourced IT Support
By:
Stephanie Hurd
September 18th, 2019
You signed a contract with an IT support company and are relieved to have the weight of technology troubles lifted from your shoulders. Not so fast. You may be in for a bumpy ride. We’ve heard all kinds of stories about why businesses are unhappy with their IT support vendor. Sometimes trouble creeps up over time as the service or the perception of service goes downhill. Other times the relationship is rocky from the start. We’re not too proud to admit that we’ve had clients leave us in search of greener pastures. We’ve also acquired new clients leaving other providers with which they became unhappy. Sometimes you need to leave your IT support provider (yes, even if it's us) when you outgrow one another or determine that your priorities and values are no longer aligned (or maybe they never were). Other times you can turn the relationship around with a little communication.
Technology Strategy | HIPAA | Threat Prevention
By:
Stephanie Hurd
August 29th, 2019
We recently used Presbyterian Health Services potential breach of protected health information (ePHI) as a case study in why employee behavior and training are key elements of security and compliance.
Technology Strategy | Business Strategy | Purchasing | Outsourced IT Support
By:
Stephanie Hurd
August 26th, 2019
There are four different ways most businesses acquire IT support.
Employee Retention | Technology Strategy | Threat Prevention | Disaster Recovery | Devices
By:
Stephanie Hurd
August 15th, 2019
I'm currently re-watching The Office (US) for what feels like the 100th time. This time, I realized that some parts have a whole new meaning now that I work for an IT company that provides tech support to businesses like the fictional Dunder Mifflin Paper Company. In this clip from Season 7, Episode 9, "WHUPF.com," Jim tries to reset the server after a power outage causes it to go down. He's stuck and The Office can't do any work since he doesn't know the password to sign into the server. This causes Michael to recall all of The Office's former IT guys to determine who originally set up the server. As Michael thinks through the list of IT guys backward from the most current by the nicknames he gave them, "Glasses, Turban, Ear Hair, Fatty 3, Shorts, Fatty 2, Lozenge, and Fatso," Kevin remembers that 'Lozenge' set up the server eight years ago. Michael recalls that whatever the password was made him laugh when he heard it but, "Pam got really offended." Jim ultimately enters Kevin's suggestion of "big boobz," based on Michael's clues. The password is accepted, the server is reset, and Dunder Mifflin lives on to sell paper another day.
HIPAA | Business Strategy | Cybersecurity | Threat Prevention
By:
Stephanie Hurd
August 12th, 2019
On June 6, 2019, Presbyterian Health Services, a health care system and health care provider in New Mexico, discovered a potential breach of protected health information (ePHI). You might assume that a hacker breached their firewall or snuck into their network undetected. That was not the case. The breach occurred because well-intentioned employees fell victim to a phishing email.
Technology Strategy | Business Strategy
By:
Stephanie Hurd
July 29th, 2019
Think of your business’ domain name as your own, branded corner of the internet. It is the space you own for business-related web and email traffic.
Technology Strategy | Business Strategy | Outsourced IT Support
By:
Stephanie Hurd
July 25th, 2019
Welcome to the third and final installment of our three-part series demonstrating the types of services you should expect from a quality outsourced IT vendor. Part I outlined the support you should expect from a help desk and service team, and Part II showed how your IT vendor should advise on business strategy. Now, we’re featuring the third element of service provided by an outsourced IT vendor, project management and implementation. Part III: Project Team Projects are pre-planned, scheduled activities, like new device installation, software migration, cabling, etc. This role might be filled by the same team that handles your day-to-day support. However, when you’re evaluating an IT partner, it is important for you to understand how they maintain the capacity to respond to daily requests while meeting their pre-scheduled project commitments.
Technology Strategy | Business Strategy | Outsourced IT Support
By:
Stephanie Hurd
July 25th, 2019
In Part I of this series we outlined the Service Team component of an outsourced IT vendor. The Service Team tends to see the most day-to-day activities from clients since they handle incoming help desk calls and emails. They resolve issues remotely or on-site at the clients’ locations. Plus, they proactively monitor and maintain client networks to address as many potential issues as possible before end-users ever notice a problem. As you evaluate the benefits of working with an outsourced IT vendor, you’ll want a good understanding of the process for requesting assistance and their guaranteed response and resolution times. Additionally, you’ll want to understand what proactive steps the team takes to resolve issues before they impact business processes and productivity. But it doesn’t stop there - the Service Team is just one component of the relationship you’ll have with a quality IT vendor.