Customer-vendor Alignment, It Governance & Data Security

Informações:

Synopsis

Manuel W. Lloyd is a top industry Virtual CIO helping healthcare and banking businesses achieve customer-vendor alignment, IT governance, and data security while avoiding costly and embarrassing data breaches. The program is supported by Holiday Delta, Inc dba Dominos Pizza, JTV Management, & Manuel W. Lloyd Consulting®

Episodes

  • Windows Server 2003 End Of Support Is This July. Are You Ready?

    23/03/2015 Duration: 29min

    In July 2010, Microsoft transitioned from providing mainstream support for Windows Server 2003 to releasing critical patches only. July 14, 2015 marks another transition, this time the end of Microsoft support for Windows Server 2003/R2.While this date may seem distant, now is the time to understand that the end of support and the end of life of Windows Server 2003 means that your business needs to ensure that it has a plan to migrate the applications and workloads currently relying on Windows Server 2003 onto Windows Server 2012 R2 or Microsoft Azure.Just to be clear, End-of-Support for Windows Server 2003 means:NO UPDATES Will be developed or released after the end of supportNO COMPLIANCE (HIPAA, PCI, SOX, etc.) which speaks for itselfNO SAFE HAVEN as both physical & virtualized environments affectedIf you're still using Windows Server 2003, you to start your planning to migrate off of Windows Server 2003 and onto a platform that will provide you the security and reliability that you’ve experienced over

  • Embracing The Age of Mobility - Part 6 of 6

    20/03/2015 Duration: 13min

    4 Essential Pieces to Any Small Business BYOD StrategyBelieve it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.Naturally, security and privacy issues are a concern since these devices synch to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited res

  • Embracing The Age of Mobility - Part 5 of 6

    19/03/2015 Duration: 29min

    A Smarter Approach to Mobile Device ManagementMore people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?

  • Embracing The Age of Mobility - Part 4 of 6

    18/03/2015 Duration: 29min

    3 Things to Consider Before Jumping Into BYODYou’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.

  • Embracing The Age of Mobility - Part 3 of 6

    13/03/2015 Duration: 29min

    Remember… Always Practice Safe BYODNo matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement.We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their iPad as they sit poolside sipping a Pina Colada. Businesses love the cost savings along with the happier and more productive employees they’re noticing. Meanwhile, customers and clients take note that their emails are commonly answered outside traditional work hours with a “Sent from my iPhone” tagline at the bottom.Like anything related to business technology, there are naysayers who are quick to warn that a more mobile and dispersed workforce also means increased security risks.Do they have a point? I'll cover that today!