@enable-change

/@enable-change

About @enable-change

This author has not yet filled in any details.
So far @enable-change has created 4 blog entries.

IDG Connect – Surviving Migration to Office 365

By | March 14th, 2017|@enable_change|

This guide outlines processes to prepare for and execute migration to Office 365.Read the full article at: www.idgconnect.com "Office 365 enables business users to create, edit and share data from PC/Mac, iOS, Android™ or Windows devices. The actual execution of the migration, however, begins and ends with the IT team, and migration from a traditional Microsoft operating system to Office 365 is far more complex than senior leaders may realize. This guide outlines processes to prepare for and execute migration to Office 365." The convenience of a mega productivity application with all the functionality Microsoft can offer may sound appealing, but migration and adoption is a giant hurdle. Companies often overlook the many changes that need to happen to transform old habits to ones compatible with the way the application works. Those who ignore this aspect of technology adoption are doomed to huge investments with less than optimal returns. If you are contemplating a move to this environment, give us a call. We can help!

In Cybersecurity, Language Is a Source of Misunderstandings

By | February 28th, 2017|@enable_change, Cyber Security|

To successfully fight threats across industries, we must all use the same terminology.Read the full article at: www.darkreading.com "We must continue to strive toward establishing a common global cybersecurity language that spans government, industry, and academia: this is our center of gravity. Until we make progress, this is a deficiency that will remain a vulnerability that our common adversaries exploit to outpace and outmaneuver us. " People are an often overlooked line of defense in any cyber security strategy. If users aren't clear about what they're supposed to do or don't understand what you are trying to tell them, even the best technology will not help. Human behavior, being what it is, is greatly helped by using simple and unambiguous language. So a word to the wise, if you're a cyber security expert, make your language plain and free of jargon if you're trying to enlist people in your fight against cyber crime. Contact us if you need help with human behavior in your cyber security programs.

Agile concepts and opportunities for contract management

By | February 7th, 2017|@enable_change, Change Leadership Capability, Operational & Process Improvement, Organizational Change Capacity|

Learn the basis for applying agile software development techniques to business operations and processes. Presentation given by Rick Walters to the National Con…Read the full article at: www.slideshare.net ICYMI: Rick Walters demystifies how to apply agile and lean software development methodologies to improve business performance. These are great lessons to learn. If your company needs help to become more agile contact us.