Where to Begin With ITIL® Implementation (Part III): Acting on the Assessment Results

Implementing ITIL’s best practices can reap many rewards for companies that include improved customer satisfaction, cost savings and enhanced employee productivity. One of the last stages of planning your ITIL implementation initiative is performing an internal assessment of your IT department and then, acting on your results.

Read more

5 Policies for Creating a Culture of Cybersecurity at Work

By modeling good cybersecurity practices, you can protect your company’s resources while also encouraging others to comply as well. In the world of security, if you are not actively and intentionally using best practices, then your normal or default choices may leave you vulnerable to malware or legal action. There are five common security policies that organizations use that cover the use of personal equipment at work, prohibited websites, protecting user account information and end users installing software. By becoming familiar with these policies, it can help you to act in a manner that helps support organizational security.

Read more