Increasing Sales or Building Capacity - Which Comes First?

This is what you might call a Chicken or Egg question, "Which comes first?” It is a conundrum which can be difficult to answer and people affirm the truth to both sides of the argument. In this case, our chicken or egg can be equated to “Sales or Capacity.”

If sales come from selling widgets and the number of widgets sold determines sales, which comes first: The ability to make more widgets or the ability to sell more widgets?

Over the last 30 years, I’ve changed my point of view on this question more than once, depending on whether I was producing widgets or selling widgets.

Topics: Business Development Business Value Business Assessment Technology Self-assessment Employee productivity EBITDA

Technology Predictions Your Company Should Invest in Today… for 2020 and Beyond

I’ve been in technology for the last 26 years. I was fortunate to participate in work study role after going back to college where I learned about networks and network technologies.

Way back then, during the first year I started, 'advanced' included:

Topics: Competitive Advantage Business Technology Trends

Three Basic Cyber Security Principles for Business

There is a myth that cyber security is too complex for the average, non-technical, business leader to understand.  In this article, we’ll be disputing that myth.  

If you are a CEO, doctor or technical expert, here are three basic principles that every cyber security expert will be following to secure your systems.

Topics: Cyber Security

Top Banking Security Concerns

In regards to new technology, fraud and cyber security, there are recent concerns around hacking impact on the 2016 elections, data security in banking and many other regulated industries.  Besides driving growth and profitability, the top challenges in banking includes managing risk around;

Topics: Cyber Security Bank Security

DMZ basics: Cyber Security

 

A DMZ (or De-Militarized Zone harkening back to the Korean War) is a physical security design for connecting a trusted network to an untrusted network.  In a DMZ the physical work is done by routers utilizing security rules.  The idea is that anyone trying to penetrate a trusted network would need to first circumnavigate the DMZ hardware to enter the private trusted network.  At the same time, the trusted network needed to be able to access network resources stored in the DMZ subnet.  The DMZ became one of the first network architectures to guard a private network.

Topics: Cyber Security

Federal Requirements Say Contractors Must Safeguard Systems

Federal Requirements Say Contractors Must Safeguard Systems. Do you contract with the federal governmen? It's important to stay up-to-date with the latest Federal Acquisition Regulations (FAR) to stay competitive and continue to win contracts. 

One of the more recent updates may require your business to take additional actions to update the way you store and transmit information related to federal contracts.

Topics: Legal Cyber Security

HIPAA Compliance: The Team

The compliant HIPAA organization, is it a myth or a reality? In this article, I wanted to cover, at a high level, what you need to know if you manage or own a medical facility. As of December of 2016, there have been over 150,500 HIPAA complaints against medical facilities in the US.  With each complaint there are typically a multitude of other violations and patients who are unhappy because they believe regulations were not followed.

2016 was the biggest yet for monetary settlements under the Health Insurance Portability and Accountability Act’s (HIPAA) privacy and security rules and it is said that 2017 is keeping pace. The U.S. Department of Health and Human Services (HHS) announced 12 such settlements in 2016, averaging nearly $2 million.

Topics: IT Project Leadership Leadership HIPAA Medical Security Cyber Security

HIPAA Compliance: Why

HIPAA compliance enforcement and how to avoid mistakes

The Health Insurance Portability and Accountability Act (HIPAA) is a federal law enacted in 1996.  The HIPAA privacy rule is a set of standards to protect the patient health information.  The privacy rules were required for medical entities by September of 2004 and their business associates by 2013. 

Topics: Security HIPAA Legal Medical Security Cyber Security