• First Reference
  • About us
  • Contact us
  • Blog Signup 📨

First Reference Talks

Discussions on Human Resources, Employment Law, Payroll and Internal Controls

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies
You are here: Home / Business / IT strategy – avoiding problems, getting the most from your investments

By Adam Gorley | 2 Minutes Read November 15, 2010

IT strategy – avoiding problems, getting the most from your investments

Information technology has infiltrated just about every aspect of business, to the point where it’s nearly impossible to avoid developing a dedicated IT strategy in order to support your main business goals.
glitchTake the new book by Jeff Papows, veteran tech executive. In Glitch: The Hidden impact of Faulty Software, Papows describes how even minor software troubles can lead to big headaches for organizations, especially if they rely on the software to carry out their business. Software glitches can affect an organization’s technology infrastructure, its business operations, and its customers, and damage an organization’s brand, reputation, productivity and ultimately its profitability.
Naturally, the book also “provides sound recommendations on how to reduce the proliferation of these glitches.”
What first caught my eye though were Papows’s “10 tips to get the most from your IT investments“. You can just navigate to Computerworld to read the complete list, but I thought I’d highlight a couple of his salient points here:

  • Establish benchmarks and evaluate progress according to agreed-upon metrics
  • Promote IT governance as a positive contributor to the company’s bottom line, and offer employee bonuses to help negate unfavourable connotations
  • Create reporting dashboards that reflect business goals
  • Apply governance at each stage of the software development life cycle to avoid gaps that lead to glitches
  • Automate where possible, but don’t abandon the human review cycle

The common themes are vigilance, measurement and alignment of IT strategy to business goals. And activating each of these themes means engaging employees (not just IT staff) in all aspects of the process. Maybe that sounds like a heavy burden, but remember two things: the potential damage of a software or general IT glitch—in terms of profits, reputation and so on—can easily outweigh the cost to prevent such events; and when employees are on board and have clear direction—in the form of a policy and procedures—the costs should become predictable.
Information Technology PolicyPro (ITPP) from First Reference covers the IT planning process from beginning to end. For example, Chapter 1 — Planning features a section on strategic planning that “identifies critical elements of the IT strategic plan and ensures that IT planning is aligned with the organization’s strategic goals”, as well as a section on Implementation that “provides overall policies for implementing and modifying systems and applications”.
Adam Gorley
First Reference Human Resources, Compliance and Internal Controls Editor

  • About
  • Latest Posts
Follow me
Adam Gorley
Editor at First Reference Inc.
Adam Gorley is a copywriter, editor and researcher at First Reference. He contributes regularly to First Reference Talks, Inside Internal Controls and other First Reference publications. He writes about general HR issues, accessibility, privacy, technology in the workplace, accommodation, violence and harassment, internal controls and more.
Follow me
Latest posts by Adam Gorley (see all)
  • Can you implement a mandatory vaccine policy or ask employees if they have been vaccinated? - June 10, 2021
  • Do you know the latest on terminations? Find out at the Ontario Virtual Employment Law Conference - May 11, 2021
  • Announcing the 2021 Virtual Ontario Employment Law Conference - April 15, 2021

Article by Adam Gorley / Business, Privacy / automation, brand, business goals, information technology, Information Technology PolicyPro, IT controls, IT governance, IT planning, IT strategy, ITPP, Jeff Papows, measurement, metrics, policy and procedures, profitability, reputation, software glitch, technology infrastructure

Share with a friend or colleague

Get the Latest Posts in your Inbox for Free!

Electronic monitoring

About Adam Gorley

Adam Gorley is a copywriter, editor and researcher at First Reference. He contributes regularly to First Reference Talks, Inside Internal Controls and other First Reference publications. He writes about general HR issues, accessibility, privacy, technology in the workplace, accommodation, violence and harassment, internal controls and more.

Reader Interactions

Comments

  1. Adam Gorley says

    March 14, 2011 at 1:06 pm

    And of course, the stakes for weak security are rising. Countries are attacking other countries’ IT infrastructure seeking sensitive data. Chinese hackers did it to Canada just a few weeks ago.
    In that case, the weak link was high-level government employees who accepted compromised e-mail attachments that executed hidden tasks. Surely good reason for a strict training regimen for all employees at all levels.

  2. Adam Gorley says

    March 14, 2011 at 12:58 pm

    Thanks for the comments Jeffrey!
    It really seems like we’ve entered a new dimension when it comes to IT security, and nobody really has a grasp on the implications, although many proclaim their expertise.
    I read the other day some talk about backing up data. The author—a purported expert—said “Don’t bother with tape backup; it’s slow and won’t last.” Well, in the Google story you pointed out, it was tape that saved Google’s e-mail subscribers’ data. A true expert would have heard about that story and at least acknowledged the continued value of tape.

  3. Jeffrey Sherman says

    March 8, 2011 at 4:06 pm

    An amazing story about how an IT security consulting company was itself hacked and badly damaged because of poor selection and use of passwords.
    See: Anonymous speaks: the inside story of the HBGary hack, http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars

  4. Jeffrey Sherman says

    March 2, 2011 at 3:45 pm

    We just had a reminder of the importance of robust and multiple backup procedures. Last week, “0.02%” of Gmail customers lost their accounts. Google’s attempt at on-line real-time backup (from multiple sites!)failed due to a software glitch, so Google backed up from tape. See: http://gmailblog.blogspot.com/2011/02/gmail-back-soon-for-everyone.html
    And an interesting analysis at: http://j.mp/fBixUP

Footer

About us

Established in 1995, First Reference is the leading publisher of up to date, practical and authoritative HR compliance and policy databases that are essential to ensure organizations meet their due diligence and duty of care requirements.

First Reference Talks

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies

Main Menu

  • About First Reference
  • Resources
  • Contact us
  • 1 800 750 8175

Stay Connected

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

We welcome your comments on our blog articles. However, we do not respond to specific legal questions in this space.
We do not provide any form of legal advice or legal opinion. Please consult a lawyer in your jurisdiction or try one of our products.


Copyright © 2009 - 2023 · First Reference Inc. · All Rights Reserved
Legal and Copyright Notices · Publisher's Disclaimer · Privacy Policy · Accessibility Policy