IT Chief Information Security Officer, CISO discussion with a board, what issues matter to them and how to engage them.

Information Technology is a core business operation, it is now essential to most business operations. Technical staff – IT Mangers, Chief Information Officers, Chief Information System Officers now are being engaged by senior management and the board. Working at this level, board members are from all backgrounds and experiences, and you may be lucky to […]
How Long Does It Take to Implement a Patch?

Every organisation should take a fresh look at the impact specific cyber events can have and whether management’s response plan is properly oriented and sufficiently supported. This review includes an assessment of internal processes and capabilities to determine whether proactive steps should be taken to make necessary improvements — both near term and long term.
IT Asset Register

Document the IT equipment in your organisation, keeping track of this allows you to manage when new equipment is needed, budget and understand if you are getting the best value from IT.
Virtual CIO
Our vCIO service gives your organisation a competitive advantage because it gives you something that your business truly lacks: an expert opinion. Technology has become a major line item on your budget. If your organisation doesn’t have the on-staff technical expertise to direct or cost-effectively implement the technology solutions you need in a manner that […]
Virtual Chief Information Officer – Go to tech expert

Life of a CIO, Chief Information Officer, Head of IT, and or basically the most knowledgeable IT person in the building on that day, is what I call being a responsible for your IT, go-to tech expert. I am partner with Mark Duffy and we work with our clients to understand their IT systems, computers, […]
Backup’s, worth their weight in Gold
This week we were on site with a client and asked the most important question “Do you have a backup that is removed each night?” Yes & didn’t know was the response. So if the building burn’s down, then your goose is cooked, you data and your business is gone, climbing Mount Everest will be […]
IT Risk Management – Questions to ask
Understanding the risk What is the value of the information we hold (e.g. intellectual property, financial, strategic plans and other business critical information, customer/personal data)? What are our ‘crown jewels’ that need the most protection? What is the potential impact if this information is stolen or corrupted (e.g. reputational damage; damage to market value and […]