IT


Apr

18

2019
Get Out Of My Inbox: Effective Communications in the C-Suite

Get Out Of My Inbox: Effective Communications in the C-Suite

At Cerius, most of our communication is virtual. We’ve tried everything under the sun, yet always find our way back to email. Communication: It’s easily the most esoteric topic in any company. It is something everyone knows we need to improve on and complains about, but it takes the most amount of work to improve, and no one knows where to start. Sometimes it feels...

Read More


Nov

24

2016
What Information can my IT Department Access?

What Information can my IT Department Access?

We’ve all heard of the hack attacks and photo leaks which are becoming a regular feature in the news. It’s not surprising considering that in today’s era information is just as valuable as money. The Information Age feeds off of personal information which includes anything from a person’s age and private details, to bank accounts, to shopping habits or even the kind of music they prefer. Some...

Read More


Jul

22

2016
What to do When IT Projects Lag Behind Schedule

What to do When IT Projects Lag Behind Schedule

There’s no stressful feeling than when your IT projects are not on a schedule. You have a lot riding on revenues from a product launch and the operational efficiency it will bring to your company, but instead, you’re stuck with more expenses and a bunch of glitches. John Schmidt offers great advice on what to do When IT Projects Fall Behind Schedule in a previous...

Read More


Apr

14

2015
The Cyber Threat Prevention and Preparation for Response

The Cyber Threat Prevention and Preparation for Response

Contributed By: Pete O’Dell The question isn’t “if” you will be the victim of a cyber-attack but rather “when”. Cyber threat prevention should be on every businesses mind. Cyber-attacks are today’s biggest real time threat for organizations of all sizes.   You have to deploy defensive measures to prevent attackers from breaching your information systems, and be prepared to respond if an intrusion attempt is successful....

Read More


Nov

07

2014
Interim CIO Files: The Case of the Runaway Train

Interim CIO Files: The Case of the Runaway Train

The latest in a series of adventures based on real client assignments. The situation and results are real. The story is just for fun. Enjoy. Harrison was no stranger to chaotic situations; not after a career in technology. He was enjoying a few peaceful moments reassembling one of his latest gadgets when he got the call from Cerius central. The problem: A multi-billion dollar healthcare...

Read More


Mar

20

2014

Shadow IT Department and Selling to the Enterprise

Contributed by Phil Morettini If you’ve ever worked in a large corporation or been in the enterprise software or hardware business for any length of time, you’re familiar with the frustrations expressed by AND about the IT department. The IT department is typically the scorn of many folks who rely on them for the systems and support which allow them to do their jobs. Let’s...

Read More


Jan

04

2014

Security and Privacy: What Secrets Does Your IT Department Know?

Contributed by Mark Davenport If you are a CEO or a CFO with an IT department of any size, you might wonder to yourself just what they know, and what they are doing with that knowledge. The first thing to understand is that no matter what the size of the department, there are individuals in IT that have admin rights to every system supported. This...

Read More


Nov

26

2012

A Commonsense Approach to Cloud Computing for Small Business

Contributed by: Dave Key The destruction done by Hurricane Sandy is another reminder of the vulnerability of maintaining on-premise IT systems.  Those businesses that had been running their business “from the Cloud” didn’t experience the downtime and potential data loss of those with on-premise IT. Business continuity after a disaster is just one reason why businesses of all sizes have been moving their IT operations...

Read More


Jun

25

2012

“Just-In-Time-Executives” for Uncertain Times

While speaking recently with the CFO of a Fortune 500 company, it became clear that the need for just-in-time-executives is everywhere no matter the size of the company. Temporary executives are a great solution to fill the part-time need or full time gaps. Since we can’t predict the future and as unstable as the economic and political environment continues to be, it helps to have...

Read More


Apr

17

2012

Is your business mobile computing friendly?

Contributed By Jesus Arriaga No matter how much a company may want to deny it, mobile computing is here to stay and is only growing stronger. A recent statistic I read from Forrester Research, Inc. stated that “25% of computers used for work globally are tablets and smart-phones, not PCs.” Consumer’s demand for convenience and real-time access to information is growing at an accelerated rate....

Read More