<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Interxect Services Limited</title>
	<atom:link href="https://www.interxect.com/tag/people/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.interxect.com</link>
	<description>Helping You Use Information Technology Productively</description>
	<lastBuildDate>Sun, 26 Aug 2018 22:19:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.interxect.com/main/wp-content/uploads/2019/08/cropped-site_icon-32x32.png</url>
	<title>Interxect Services Limited</title>
	<link>https://www.interxect.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">113413426</site>	<item>
		<title>Will automation eliminate your job? The knowledge worker has a lot to lose if we don&#039;t act.</title>
		<link>https://www.interxect.com/will-automation-eliminate-your-job/</link>
					<comments>https://www.interxect.com/will-automation-eliminate-your-job/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 23 Apr 2015 02:00:04 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[knowledge worker]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[people]]></category>
		<guid isPermaLink="false">http://www.interxect.com/?p=1111</guid>

					<description><![CDATA[Will automation make the knowledge worker an extinct species?]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" src="https://www.interxect.com/main/wp-content/uploads/2015/04/Knowledge-Automation-250x200.jpg" alt="knowledge automation" width="250" height="200" class="alignleft size-post-image wp-image-1113" />Can automation render managers useless?<span id="more-1111"></span></p>
<p>There&#8217;s a great blog post on the Harvard Business Review titled &#8220;<a href="https://hbr.org/2015/04/heres-how-managers-can-be-replaced-by-software">Here&#8217;s How Managers Can Be Replaced by Software</a>&#8221; written by Devin Fidler.</p>
<p>The article discussed how a prototype software application automated the decision and delegation process to create a 124-page research report.</p>
<p>The software was named &#8220;iCEO&#8221;, which I expect to be trademarked by Apple Inc. soon! <img src="https://s.w.org/images/core/emoji/15.1.0/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>The post explained that after spending a few hours configuring iCEO and then setting it to run, iCEO:</p>
<blockquote><p>
  routed tasks across 23 people from around the world, including the creation of 60 images and graphs, followed by formatting and preparation.
</p></blockquote>
<p>The processes were so smoothly operated that the team was simply spectators.</p>
<blockquote><p>
  We rarely needed to intervene, even to check the quality of individual components of the report as they were submitted to iCEO, or spend time hiring staff, because QA and HR were also automated by iCEO.
</p></blockquote>
<p>In the end, the full report was created in just weeks, compared to a traditional management-employee structure that may have taken months to complete.</p>
<p>This is awesome if you think about it&#8230; unless you&#8217;re a manager that is.</p>
<p>There&#8217;s an especially important point to note here that you may have missed: all of the actual work was outsourced via <a href="https://www.elance.com/">Elance</a> and <a href="https://www.odesk.com/">Odesk</a>.</p>
<p>So it&#8217;s not only the manager&#8217;s job that may be at risk, but also the workers under his employ.</p>
<h2>The Knowledge Worker at Risk</h2>
<p>Automation, since the industrial revolution, has threatened jobs of workers. Manual work replaced with mechanised ones caused jobs to no longer be worthwhile. Now we have thinking work being replaced by computers and software.</p>
<p>In his book, &#8220;<a href="http://www.amazon.com/Zero-Marginal-Cost-Society-Collaborative-ebook/dp/B00HY09XGQ/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1429674104&amp;sr=1-1&amp;keywords=zero+marginal+cost+society">The Zero Marginal Cost Society</a>&#8220;, Jeremy Rifkin mentions that:</p>
<blockquote><p>
  Automation, robotics, and artificial intelligence are eliminating human labor quickly in the white-collar and service industries&#8230; Secretaries, file clerks, telephone operators, travel agents, bank tellers, cashiers, and countless other white-collar service jobs have all but disappeared in the past 25 years as automation has driven the marginal cost of labor to near zero.
</p></blockquote>
<p>He goes on to later say:</p>
<blockquote><p>
  We are in the midst of an <strong><em>epic change</em></strong> (my emphasis) in the nature of work. The First Industrial Revolution ended slave and serf labor. The Second Industrial Revolution dramatically shrank agricultural and craft labor. The Third Industrial Revolution is sunsetting mass wage labor in the manufacturing and service industries and salaried professional labor in large parts of the knowledge sector.
</p></blockquote>
<p>Others are also anticipating this level of disruption to knowledge work.</p>
<p>A <a href="http://www.mckinsey.com/insights/business_technology/disruptive_technologies">2013 McKinsey Global Institute report</a> predicts that by 2025, the automation of knowledge work would have potentially the greatest economic impact second only to the mobile internet, and exceeding that of the Internet of Things and the Cloud. (See the figure below.)</p>
<p><a href="https://www.interxect.com/main/wp-content/uploads/2015/04/mckinseybarchart.png"><img decoding="async" src="https://www.interxect.com/main/wp-content/uploads/2015/04/mckinseybarchart-1024x829.png" alt="McKinsey bar chart disruptive trends" width="580" height="470" class="aligncenter size-large wp-image-1114" srcset="https://www.interxect.com/main/wp-content/uploads/2015/04/mckinseybarchart-1024x829.png 1024w, https://www.interxect.com/main/wp-content/uploads/2015/04/mckinseybarchart-768x622.png 768w, https://www.interxect.com/main/wp-content/uploads/2015/04/mckinseybarchart-300x243.png 300w, https://www.interxect.com/main/wp-content/uploads/2015/04/mckinseybarchart.png 1430w" sizes="(max-width: 580px) 100vw, 580px" /></a></p>
<h2>Time to address the skill gap</h2>
<p>As with the industrial revolution, workers have to be ready for the next stage. It means that they need to learn new technologies and new ways of working. Learning skills that can be repetitive, regardless of the complexity, is under threat as they can be replaced with automation.</p>
<p>According to the <a href="http://www.iftf.org">Institute for the Future</a>, the <a href="http://www.iftf.org/futureworkskills/">new worker will be required to have skills</a> such as Social Intelligence, Sense-Making, Novel and Adaptive Thinking, Design Mindset, Computational Thinking, Cognitive Load Management, New Media Literacy, Cross Cultural Competency and Virtual Collaboration.</p>
<p>The challenge we have right now is that the rapid evolution of the Internet, the cloud and automation may change the workplace faster than we can retrain workers to work in this new environment. It means that we have to start training the new workers from the schools.</p>
<p>But this does not mean that we can&#8217;t start training for the new era. We can start learning the new skills required, as well as teach it to others before we are out of a job.</p>
<h2>What the future holds?</h2>
<p>I don&#8217;t know what the future holds, but automation offers great opportunities for businesses to function at a far more efficient and economic level than ever before. It means that we can look forward to cheaper and (hopefully) more sustainable goods and services.</p>
<p>It also means that we can let go of mundane and repetitive tasks and focus on creating greater things.</p>
<p>We can choose to fear what the future holds, or look forward to it with excitement and anticipation.</p>
<p>I&#8217;m in that latter group.</p>
<p>What about you? What are your thoughts on the future of automation?</p>
<p>Original article: <a href="https://www.interxect.com/will-automation-eliminate-your-job/" rel="bookmark" title="Permanent link to 'Will automation eliminate your job? <small class="subtitle">The knowledge worker has a lot to lose if we don't act.</small>'">Will automation eliminate your job? <small class="subtitle">The knowledge worker has a lot to lose if we don't act.</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/will-automation-eliminate-your-job/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1111</post-id>	</item>
		<item>
		<title>Stupid people and data security Why we can&#039;t totally trust people with information security</title>
		<link>https://www.interxect.com/stupid-people-and-data-security/</link>
					<comments>https://www.interxect.com/stupid-people-and-data-security/#comments</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 29 Jan 2015 01:01:56 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=1097</guid>

					<description><![CDATA[Should you trust your data security to people? Let me tell you a story that has nothing to do with IT...]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" src="https://www.interxect.com/main/wp-content/uploads/2015/01/Stupid_people-250x200.jpg" alt="Simple PIN code" width="250" height="200" class="alignleft size-post-image wp-image-1098" />People are stupid!</p>
<p>Before you click away, let me tell you a story&#8230;<span id="more-1097"></span></p>
<p>I went to a conference recently and got a few pens and a couple of Hershey&#8217;s chocolate minis. I put it in my pocket and went my merry way.</p>
<p>When I reached home, I pulled out the pens from my pocket only to find some brown stuff on one. My immediate thought was that it was the chocolate melted and leaked out onto the pen.</p>
<p>To test this theory, I licked it, and&#8230; let&#8217;s leave it at that for now.</p>
<p>I could have just smelt it, or not bother and wipe it off, but I chose to taste it instead.</p>
<p>I say this not to gross you out, but to say, that no matter how smart you may think you are, you do some really stupid things sometimes.</p>
<p>The same thing happens with emails with seductive subject lines. Or links that promises something good if you click it. Things that lead to only bad things for users, and your data.</p>
<p>You would think that incidents such as these would never happen?</p>
<p>After all, you&#8217;ve spent loads of time training users. You&#8217;ve handed out lots of information about being safe on-line. You&#8217;ve shared instances of breaches due to human error.</p>
<p>But they do.</p>
<p>We should know better. It should be an automatic feeling that clicking that link or opening that attachment is a bad idea.</p>
<p>But we do it anyway.</p>
<p>That is why I say that awareness training is part of an arsenal that you have to stave off malicious attacks. But there&#8217;s bound to be some human error sometime, and you have to be ready for that.</p>
<p>So you have to have proper and updated anti-virus and anti-malware software. You need to put in that next generation firewall protection on the corporate network, and more firewall protection on PCs. You must have properly functioning backup systems in place to protect your data.</p>
<p>Technology needs to get better. Law enforcement needs to be stronger.</p>
<p>You still need security awareness training, and if the human being was perfect, then awareness training may be all that was required to protect your data.</p>
<p>But we are not.</p>
<p>As for that brown stuff&#8230; it was chocolate. But what if it wasn&#8217;t?&#8230; <em>EWWW!</em></p>
<p>Original article: <a href="https://www.interxect.com/stupid-people-and-data-security/" rel="bookmark" title="Permanent link to 'Stupid people and data security <small class="subtitle">Why we can't totally trust people with information security</small>'">Stupid people and data security <small class="subtitle">Why we can't totally trust people with information security</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/stupid-people-and-data-security/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1097</post-id>	</item>
		<item>
		<title>The softer side of IT 3 Soft Skills that every member of IT should have</title>
		<link>https://www.interxect.com/the-softer-side-of-it/</link>
					<comments>https://www.interxect.com/the-softer-side-of-it/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 24 Jul 2014 02:00:50 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Information technology]]></category>
		<category><![CDATA[IT management]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[Soft skills]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=1040</guid>

					<description><![CDATA[IT staff often see their technical skills as all that they need in order to succeed, but not having the right mix of softer skills truly hampers the growth of these very talented people.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-1045" src="https://www.interxect.com/main/wp-content/uploads/2014/07/Soft-250x200.jpg" alt="Soft" width="250" height="200" />In many organisations, there is a love/hate relationship with IT. Everyone agrees that IT is crucial to modern businesses, and has helped to make work more efficient. However, many complain about IT staff not being customer focused or friendly, and they consider IT as being too &#8220;techie&#8221; and unable to relate to the users when they have problems or challenges.<span id="more-1040"></span></p>
<p>I&#8217;ll admit that I was once like that too, but I&#8217;ve worked hard to eliminate it. Though, very rarely, when I&#8217;m really stressed out, you can see that side of me come out.. but that hasn&#8217;t happened in a really long time :-).</p>
<p>I&#8217;m proof that even those &#8220;techie&#8221; IT staff can change and become more personable to the users within the business. All they need to do is develop their softer skills.</p>
<p>What are these soft skills that IT staff should develop? And how can you help them?</p>
<h2>Communication Skills</h2>
<p>This is at the top of the list. The common complaint is that IT staff are unable to communicate effectively. I disagree though. IT staff are able to communicate very well; they are unable to communicate with people who are not their peers.</p>
<p>IT staff need to learn to communicate effectively to the layman, by understanding their audience and thinking about how they may understand the topic that they are trying to communicate.</p>
<p>There are many ways that you can help staff members become better communicators, whether written or verbally.</p>
<ul>
<li>Suggest joining Toastmasters, or send them to a Dale Carnegie course.</li>
<li>Have internal sessions where you give each person a chance to speak about something non-technical that is important to them.</li>
<li>Give constructive feedback on written works they&#8217;ve done.</li>
</ul>
<p>For a member of IT learning to communicate with users is not always easy, but another skill can help…</p>
<h2>Empathy</h2>
<p>Empathy is the feeling that you understand and share another person&#8217;s experiences and emotions. I&#8217;m not at all saying that members of the IT department have no empathy; if they didn&#8217;t have empathy they&#8217;d all be sociopaths (although some may argue that they are).</p>
<p>What I am saying is that sometimes the IT staff has problems understanding the experiences from the users&#8217; point of view. By helping them to become more empathetic, IT staff can relate to user challenges, and will hopefully treat them better (I make no promises).</p>
<p>You may sometimes hear about this as &#8220;Emotional Intelligence&#8221; as coined by Daniel Goldman. There are courses on emotional intelligence, although I believe this is something that requires longer term coaching.</p>
<p>Someone needs to point out to the IT person what they did, and simply ask, &#8220;How would you feel if so and so happened to you or to a loved one?&#8221; or &#8220;How do you expect that the other person feels about so and so?&#8221;.</p>
<p>You have to get them into the other person&#8217;s shoes so they can begin to relate to it.</p>
<p>Of course the person doing the coaching should be empathetic too, otherwise it&#8217;d just be a case of the blind leading the blind.</p>
<p>It may take some time, but after a while, the person will show improvement. Granted, they may not be the most compassionate person in the world, but they would certainly be more empathetic than they were before.</p>
<h2>Critical Thinking</h2>
<p>IT staff tend to be very logical thinkers. We follow a well defined thinking style to resolve issues. It is indeed one of our strengths, and is also found in areas such as engineering and other physical sciences.</p>
<p>However, such thinking style often results in rigid beliefs and thoughts. What we need to grow is our &#8220;Critical Thinking&#8221; skills.</p>
<p>Critical thinking is the process of critically assessing our thinking, and finding ways to improve it.</p>
<p>A definition I like from <a href="http://www.criticalthinking.org" target="_blank">the Critical Thinking Community</a>:</p>
<blockquote><p>Critical thinking is that mode of thinking — about any subject, content, or problem — in which the thinker improves the quality of his or her thinking by skillfully analyzing, assessing, and reconstructing it.</p>
<p>Critical thinking is self-directed, self-disciplined, self-monitored, and self-corrective thinking. It presupposes assent to rigorous standards of excellence and mindful command of their use. It entails effective communication and problem-solving abilities, as well as a commitment to overcome our native egocentrism and sociocentrism.</p></blockquote>
<p>We must therefore revisit our thoughts and beliefs and discover if they are right. Especially in this fast changing field, what we once knew, may not be true anymore or even relevant.</p>
<p>Developing critical thinking is a process, and there are many books and tools out there to help you develop it. One of my favourite books is <a href="http://www.amazon.com/Didnt-Unthinkable-Achieve-Creative-Greatness/dp/0735202575" target="_blank">&#8220;Why Didn&#8217;t I Think of That? Think the Unthinkable and Achieve Creative Greatness&#8221; by Charles McCoy Jr.</a>, but there are tons of other books out there, such as <a href="http://www.amazon.com/Cracking-Creativity-Secrets-Creative-Genius/dp/1580083110" target="_blank">&#8220;Cracking Creativity: The Secrets of Creative Genius&#8221; by Michael Michalko</a> (which I also recommend), that are worth investigating.</p>
<p>The development of critical thinking may work best in a group setting, so set time aside for group activities where you can help your entire team become better thinkers.</p>
<h2>In Summary</h2>
<p>There are other skills that may help, such as presentation skills, but the three I&#8217;ve listed would help your team go a long way.</p>
<p>IT staff often see their technical skills as the be all and end all of what they need in order to succeed. But I&#8217;ve seen time and time again, where not having the right mix of softer skills truly hampers the growth of very talented people.</p>
<p>These skills just don&#8217;t make you a better member of the IT Staff… it makes you a better person.</p>
<p>And it&#8217;s never too late to learn to be a better person.</p>
<p>&nbsp;</p>
<p>Original article: <a href="https://www.interxect.com/the-softer-side-of-it/" rel="bookmark" title="Permanent link to 'The softer side of IT <small class="subtitle">3 Soft Skills that every member of IT should have</small>'">The softer side of IT <small class="subtitle">3 Soft Skills that every member of IT should have</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/the-softer-side-of-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1040</post-id>	</item>
		<item>
		<title>Should you outsource your IT Security? There may be advantages to be had after all!</title>
		<link>https://www.interxect.com/should-you-outsource-your-it-security/</link>
					<comments>https://www.interxect.com/should-you-outsource-your-it-security/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 21 Nov 2013 00:00:23 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[MSSP]]></category>
		<category><![CDATA[outsourcing]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[processes]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[service provider]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=873</guid>

					<description><![CDATA[More and more businesses are considering Managed Security Service Providers to fill the gaps in their IT security. While I am cautious of this, you will see that there are many advantages.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-874" alt="Outsource vs inhouse" src="https://www.interxect.com/main/wp-content/uploads/2013/11/outsource-inhouse-250x200.jpg" width="250" height="200" />There is a growing trend in businesses to outsource their IT Security to Managed Security Service Providers (MSSP). I&#8217;ll be upfront and state that I was not a big fan of this, as I believed that IT security is too important to pass off to a 3rd party, especially with the financial institutions who I mainly work with. But there is a growing body of research that finds that there are some areas where it may be worthwhile considering outsourcing.<span id="more-873"></span></p>
<h2>What does an MSSP do?</h2>
<p>MSSPs provide a variety of services, such as:</p>
<ul>
<li>Security monitoring – monitoring of firewalls, intrusion detection/prevention systems (IDS/IPS), system logs, etc.</li>
<li>Managed Spam Services – scanning of email for Spam and malicious content</li>
<li>Managed Storage Services – services such as backup/restore, archiving for compliance purposes, or disaster recovery services.</li>
<li>Threat Intelligent – aggregate warning system based on feedback from multiple end-users.</li>
<li>Compliance auditing – auditing for compliance with government or other regulations</li>
<li>Vulnerability assessments and Penetration testing – scanning and testing of systems for vulnerabilities</li>
<li>Managed Network Services – monitoring of networks for performance and outage issues</li>
<li>Identity and Access Management – services allowing authentication across heterogeneous systems, while maintaining compliance requirements</li>
</ul>
<p>MSSPs are growing, and Gartner believes that the <a href="http://www.gartner.com/newsroom/id/2616115" target="_blank">Managed Security Services (MSS) market will be worth US$2.1b in 2013, and projected to reach US$3.1b in 2013</a>.</p>
<h2>My concerns on IT Security Outsourcing</h2>
<p>Firstly, let me mention my concerns about outsourcing the IT security function.</p>
<ol>
<li>Accidental/Intentional leaking or theft of secret information by agents of the MSSP. This is my greatest concern, although it probably has the lowest chances of happening. Contrary to popular belief, few security professionals or agencies are willing to risk their reputations to steal or leak data, but it can happen (think of Edward Snowden). A MSSP may have access to a lot of systems and data, and does pose a risk. Capturing this risk can be difficult, as you can monitor for unauthorised access, but how do you monitor for access to data that the MSSP has to access to perform their duty?</li>
<li>The MSSP goes out of business. Don&#8217;t think that this can&#8217;t happen, because <a title="The Dark Side of the Cloud: IBM Partner Gives Folks Two Weeks to Move Data" href="http://www.wired.com/search?gs=The+Dark+Side+of+the+Cloud+IBM+Partner+Gives+Folks+Two+Weeks+to+Move+Data" target="_blank">it has happened before</a>, and it will happen again. What happens when your MSSP goes dark, do you have a contingency? Without the experience in-house, and the time it would take to find another MSSP, you will be placed in a very risky situation.</li>
<li>The MSSP fails to perform as expected. So you have a breach, and customer data is purloined, while your MSSP was supposed to be monitoring for intrusions. Who is held responsible? You can outsource your activities, but you can&#8217;t outsource your responsibilities; you are ultimately accountable for securing your systems.</li>
</ol>
<h2>Are there advantages?</h2>
<p>There are several advantages of MSSP.</p>
<ol>
<li>Lower cost. This is often the main advantage cited by enterprises for going with an MSSP, but, I warn you, should not be the only reason for outsourcing. Because of economies of scale, a MSSP can charge a fraction of what it would take to outfit your organisation – hardware, software and people – to provide the services provided by the MSSP.</li>
<li>Greater expertise. Because a MSSP may be specialised, they are more likely to have a higher calibre of security professional within their team. Additionally, because they are exposed to the systems of other organisations, they can develop best practices that they could then use for your organisation.</li>
<li>Greater intelligence. Again, the MSSP has data coming in from several organisations, and are in a position to capture events before they strike your enterprise. They could even develop new ways of analysing data to improve detection of threats.</li>
<li>Greater scalability. The service of an MSSP can be scaled up or down with little effort of the organisation.</li>
</ol>
<h2>Can you have your cake and eat it too?</h2>
<p>Now, you have to admit, those are pretty good advantages. So how can you get those advantages while addressing the risks?</p>
<p>Firstly, build your own capabilities. To discover possible leaks or attempts mean that you must have the skills necessary in-house to do that. This team does not have to be big – 1 or 2 persons – as the bulk of the operational work will be performed by the MSSP. The in-house team will be responsible for managing the IT security systems, and ensuring that the MSSP is on the up and up.</p>
<p>Secondly, keep your IT security management in-house. Outsource the monitoring and testing activities such as monitoring of system logs and IDS/IPS systems, and vulnerability and penetration testing, but keep the management and configuration of systems being monitored or testing with your in-house staff.</p>
<p>Thirdly, build a relationship with the MSSP and audit them regularly, to ensure that they have the proper policies in place and that they are following them. Also, check their audited financials to look out for red flags pointing to a failing business model.</p>
<p>Lastly, build your service level agreements and payment contracts based on performance. That is, that your MSSP must perform to a certain standard to get remunerated for their services. These standards must be SMART – Specific, Measurable, Attainable, Realistic and Time-Related – and reasonable. Remember, that when negotiating with an MSSP, that this is a partnership, not a battle; always aim for win-win.</p>
<h2>So&#8230;</h2>
<p>At first I was extremely wary of outsourcing IT security functions. I still take the position that if an organisation is able to, then it is preferable to have an in-house IT security team for all aspects of IT security. But the more that I look at the services that MSSPs provide, and the benefits that enterprises can obtain, there is a strong case for outsourcing some aspects that an organisation is unable to undertake.</p>
<p>Original article: <a href="https://www.interxect.com/should-you-outsource-your-it-security/" rel="bookmark" title="Permanent link to 'Should you outsource your IT Security? <small class="subtitle">There may be advantages to be had after all!</small>'">Should you outsource your IT Security? <small class="subtitle">There may be advantages to be had after all!</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/should-you-outsource-your-it-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">873</post-id>	</item>
		<item>
		<title>Improve the Success Rates of your IT Projects with these Simple Ideas Your users hold the key!</title>
		<link>https://www.interxect.com/improve-the-success-rates-of-your-it-projects-with-these-simple-ideas/</link>
					<comments>https://www.interxect.com/improve-the-success-rates-of-your-it-projects-with-these-simple-ideas/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 31 Oct 2013 00:00:55 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Information technology]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[projects]]></category>
		<category><![CDATA[Soft skills]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=821</guid>

					<description><![CDATA[IT Projects have a 30% - 40% chance of failing. Companies can benefit tremendously from improving those odds. Here's some simple ideas on how IT departments have more successful projects.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-823" alt="Project management" src="https://www.interxect.com/main/wp-content/uploads/2013/11/Project_Management-250x200.jpg" width="250" height="200" />In 1995, the Standish Group released their <a href="http://www.projectsmart.co.uk/docs/chaos-report.pdf" target="_blank">Chaos report</a>, which put the failure rate of large information technology projects at 31%. In 2011, PM Solutions released their report, <a href="http://www.pmsolutions.com/collateral/research/Strategies%20for%20Project%20Recovery%202011.pdf" target="_blank">Strategies for Project Recovery</a>, which put the &#8220;at risk&#8221; IT projects at 37%.</p>
<p>These same reports put lack of user involvement and stakeholder engagement as one of the top obstacles that these IT projects face.<span id="more-821"></span></p>
<p>I think that IT departments sometimes forget that they&#8217;re there to help end-users do their job; IT is a tool for the business, but users are treated as secondary to the operations. This is particularly so with IT projects. I suppose it&#8217;s because it&#8217;s easy for IT teams to get absorbed and giddy with new technologies.</p>
<p>Users are consulted, but at the beginning of the project, and only to get the &#8220;user requirements&#8221;. The IT department then goes off to work to create the next big thing. They return later with the finished product and the users hate it. Tony Collins once said, &#8220;Users are likely to reject any system that gives them what they asked for. Better… to understand what users do rather than what they say they do.&#8221;</p>
<p>You can increase the chances of success of IT projects by collaborating and getting buy-in from users. Even projects that are on the brink of failure can be recovered and go on to be successful, as the PM Solutions report shows.</p>
<p>Here are some ways to work with your users to increase project success rates.</p>
<ul>
<li>Truly engage your users. Don&#8217;t just put them in a meeting and tell them what you are doing, but listen to them. Ask about their thoughts; tell them your difficulties and ask for their input on how you may solve them. You might be amazed at what you may get.</li>
<li>Start training them from the start. If you have an exam in the next couple of months, you don&#8217;t wait until the last minute to study (ok, maybe some of you do, but you don&#8217;t do that well, and you forget everything by the next day); instead you study and practice a bit before the exam so you can ace it. So why does the IT department expect users to suddenly adopt the new IT system when it goes live with little or no training? Instead start training them once you have a minimum viable product. The feedback you get would also be very valuable.</li>
<li>Be consistent. Have you ever gone on a diet and achieved your target weight? If you&#8217;re like most people, a few months later you&#8217;ve gained it all back, or at least a few pounds (sometimes a few more than when you started). People have a tendency to go back to the status quo if you have not put systems in place to keep the change effective. Keep on top of the users, getting their feedback, and incorporating it into continuous improvement.</li>
</ul>
<p>Original article: <a href="https://www.interxect.com/improve-the-success-rates-of-your-it-projects-with-these-simple-ideas/" rel="bookmark" title="Permanent link to 'Improve the Success Rates of your IT Projects with these Simple Ideas <small class="subtitle">Your users hold the key!</small>'">Improve the Success Rates of your IT Projects with these Simple Ideas <small class="subtitle">Your users hold the key!</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/improve-the-success-rates-of-your-it-projects-with-these-simple-ideas/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">821</post-id>	</item>
		<item>
		<title>Taking Caribbean Businesses Forward ICT can help!</title>
		<link>https://www.interxect.com/taking-caribbean-businesses-forward/</link>
					<comments>https://www.interxect.com/taking-caribbean-businesses-forward/#respond</comments>
		
		<dc:creator><![CDATA[Vashti Ganpat]]></dc:creator>
		<pubDate>Thu, 24 Oct 2013 00:00:47 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Caribbean]]></category>
		<category><![CDATA[Information technology]]></category>
		<category><![CDATA[people]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=847</guid>

					<description><![CDATA[Executive management don't often value information technology, but ICT can offer real gains for the Caribbean business.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-848" alt="Business Tech" src="https://www.interxect.com/main/wp-content/uploads/2013/10/Fotolia_50400145_XS-250x200.jpg" width="250" height="200" />Information Technology has always been seen by non-IT personnel as just the technical aspects of a business. The computer freezes or the paper jams in the printer and you call the IT department! Certainly the fallacy of this thought pattern needs correcting. Management must also be trained to understand the potential and real values that technology offers in achieving the company&#8217;s goals and objectives such as cost minimization, increased efficiency and gaining competitive advantage.<span id="more-847"></span></p>
<p>The recent call by Grenada&#8217;s Prime Minister for the unification of the region via ICT is an opportunity for Caribbean countries to explore the seemingly endless potential of technological advancements, to create a powerhouse of our own. If we were to redefine the IT department into a fully functional business unit, focused on business areas and business value, this marketing-type perspective can allow the delivery of competitive services rather than just support services.</p>
<p>The technology already exists that can give Caribbean businesses an edge in the global market. Some of these include –</p>
<ul>
<li>Pervasive Computing – used by mobile apps to automatically &#8220;find the user&#8221; based on the situation. Now this is exciting for Caribbean mobile users as 12 out of 16 countries surveyed in 2013 show mobile/cellular subscriptions densities over 100%</li>
<li>Seamless Collaboration – it is easier than ever for people almost anywhere to work together in this digital age. Employees are expected to take advantage of the ever increasing popularity of social media without any formal training. By adjusting the work and processes to be more social-driven and collaborative, the organization can become more productive, efficient and innovative.</li>
<li>Cloud – there is no question about using the Cloud, just &#8220;how&#8221; to use it. This will be determined by the organization&#8217;s proactive approach to the growth of hybrid cloud, especially in equipping the relevant staff with the skills required to allow the components to work seamlessly.</li>
<li>Active Defence – breaches in security can pose risks to business operations during disruptions; the reputation of the organization becomes sullied should customer information be compromised; and of course the financial impact of either of these can be crippling. No longer can IT security be about monitoring and prevention alone but pre-emptive action must be taken to stay flexible, adaptable and always one step ahead of the potential danger.</li>
</ul>
<p>There are many more innovations available to us here in the Caribbean but one aspect of implementing and using new technology that is overlooked or given little attention is the human aspect. It is not always possible to engage all employees in the decision making process but consultation with staff most impacted can allay fears of the impending changes. Rumours are often believed before any real communication occurs and this is where the IT unit can be used as the internal change agent group to facilitate the communication process between management and staff.</p>
<p>The possibilities IT present are endless to businesses serious about enhancing the customer and employee experience while positioning themselves to be more responsive to opportunities and threats.</p>
<p>Original article: <a href="https://www.interxect.com/taking-caribbean-businesses-forward/" rel="bookmark" title="Permanent link to 'Taking Caribbean Businesses Forward <small class="subtitle">ICT can help!</small>'">Taking Caribbean Businesses Forward <small class="subtitle">ICT can help!</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/taking-caribbean-businesses-forward/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">847</post-id>	</item>
		<item>
		<title>Office Politics can hurt your IT Here&#039;s what you can do about it...</title>
		<link>https://www.interxect.com/office-politics-can-hurt-your-it/</link>
					<comments>https://www.interxect.com/office-politics-can-hurt-your-it/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Wed, 07 Aug 2013 02:27:18 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[Business Tips]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Information technology]]></category>
		<category><![CDATA[office]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Soft skills]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=804</guid>

					<description><![CDATA[Office politics are present in every organisation and in every instance, it has the power to poison the company from the inside out. When it happens within the IT department, not only can it demoralise staff, but it also puts your data and business at risk. Minimise the politics, and you increase the effectiveness of your IT department.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-post-image wp-image-808" alt="Office-Tug-of-War" src="https://www.interxect.com/main/wp-content/uploads/2013/08/Office-Tug-of-War-250x200.jpg" width="250" height="200" />Office politics are present in every organisation with more than one employee. And in every instance, it has the power to poison the company from the inside out, killing it slowly.</p>
<p>I&#8217;m sure you&#8217;ve also seen it happen at the department level – power plays between employees. I&#8217;ve seen it before where staff members will not do certain tasks, see issues but will not resolve it, or worst, sabotage efforts of another to make them seem incompetent.</p>
<p>Such negative activities reduce the capability and productivity of the department. And in the IT department, it can be hazardous for your data, which can become pawns in this dangerous game of chess play.</p>
<p>So what can you do about it?<span id="more-804"></span></p>
<h2>1. Do not get involved</h2>
<p>Often the manager or team supervisor will get involved with the gossip and negativity with the intention of being &#8220;friends&#8221;, but this just adds fuel to the flames. Don&#8217;t do that! Nothing demoralises a department or business more than the leadership getting involved in the politics, even if done behind closed doors.</p>
<p>So what to do instead?</p>
<h2>2. Listen and Be Open</h2>
<p>When there is conflict or negativity, listen carefully to your staff and team. Do not interject or offer advice, no matter how much you want to. Get the person talking about what is going on. Why do they feel the way they do? What do they think cause it? What do they want to happen? What would they like the environment to feel like?</p>
<p>Do not judge. Just listen and take notes (after asking if it is okay to do so first).</p>
<h2>3. Mirror and empathise</h2>
<p>This is a very tricky area here. You do not want to make light of anyone&#8217;s issues, but also you do not want to agree that they are right (unless for sure they are). Instead empathise with the way they feel saying something, &#8220;and this whole situation has you feeling&#8230; angry? Disappointed?&#8221; or &#8220;I understand that you may be feeling frustrated&#8221;. The idea here is to let the other person feel felt.</p>
<h2>4. Formulate an action plan</h2>
<p>Once the person is talking and is open to dialog, formulate an action plan as to what needs to happen next. It might be tempting to bring the other person in, but I suggest that you talk to the other person in private first to get them open to dialog as well. Once that happens, then you can have both in the room with you as a mediator. Mediation is another skill that I will address in another article, but for now, know that it is something that may be required.</p>
<p>Ensure to set deadlines to when certain things are to happen so that there is not another issue of unmet expectations.</p>
<h2>Issues addressed, what next?</h2>
<p>Once major issues have been addresses and things have settled down, it may be beneficial to do the following.</p>
<h3>Understand the informal organisational structure</h3>
<p>Not all power and influence comes from position and job title. Many people have influence outside of position or may have the ears of people in high positions. There may be cliques and groups, and others who seem dead set to put one against another. By understanding these linkages, you will be in a better position to head-off potential problems.</p>
<h3>Keep your ears to the ground</h3>
<p>Listen out for grumblings among employees and staff, and be ready to address any rumour circulating before they become uncontrollable. In the absence of open dialogue, presumptions run wild. Keep friendships with people who are always in tune to the grape vine; this is usually the receptionist, but could also be admin staff.</p>
<h3>Build relationships at all levels</h3>
<p>By building relationships at all levels of the business, you can have greater resources at your disposal to address issues that come along. You can also learn from others how best to approach certain issues so you can benefit from that knowledge and handle the politics more effectively.<br />
Learn to recognise and treat all peers and employees fairly.</p>
<p>&nbsp;</p>
<p>You may never be able to eliminate office politics from the work environment, but you can work to minimise the negative effects. And if you can minimise office politics within the IT department, you have one less thing affecting your data to worry about.</p>
<p>Do you have a story to share about how you handled your internal politics? Or how do you feel about the advice that I&#8217;ve given? Please leave your comments below.</p>
<p>Be sure to sign up for our e-mail list where we plan to send out regular tips on how you can improve IT and your business along with it.</p>
<p>Original article: <a href="https://www.interxect.com/office-politics-can-hurt-your-it/" rel="bookmark" title="Permanent link to 'Office Politics can hurt your IT <small class="subtitle">Here's what you can do about it...</small>'">Office Politics can hurt your IT <small class="subtitle">Here's what you can do about it...</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/office-politics-can-hurt-your-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">804</post-id>	</item>
		<item>
		<title>Is Your Data Security Technology a Moral Hazard? How more may be less!</title>
		<link>https://www.interxect.com/is-your-data-security-technology-a-moral-hazard/</link>
					<comments>https://www.interxect.com/is-your-data-security-technology-a-moral-hazard/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Fri, 14 Jun 2013 20:40:11 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business IT]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Financial Risk]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=726</guid>

					<description><![CDATA[In the insurance world, moral hazard is where an insured person takes more risks because the potential costs of such risks are taken care of by another party. In IT there is something very similar.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-post-image wp-image-727 alignleft" alt="Risky Behaviour" src="https://www.interxect.com/main/wp-content/uploads/2013/06/Fotolia_46509292_XS-250x200.jpg" width="250" height="200" />Can technology make you less safe from cyber-threats?</p>
<p>I mentioned before that <a title="IT Security and Insurance | Two sides of the same coin" href="https://www.interxect.com/main/2013/02/it-security-and-insurance/" target="_blank">too much technology can be detrimental to your information security goals</a>. In the insurance industry, there is something called moral hazard. Moral hazard is where an insured person takes more risks because the potential costs of such risks are taken care of by another party.<span id="more-726"></span></p>
<p>This also happens with IT security. Think about yourselves for a moment. You feel safer with anti-virus software and personal firewalls installed on your PC, and as such you may browse more &#8220;freely&#8221; on the Internet. Yes, your risks have decreased, but the additional risky behaviour – unsafe browsing in this case – may now increase your risk of being affected by malicious software.</p>
<p>I&#8217;ve seen this with many organisations. They&#8217;ve implemented some of the best security, but still have security breaches, by sometimes the simplest infections. This often causes them to doubt the effectiveness of the products and to then get more security products to address the perceived weaknesses. What had instead happened was the users had come to expect that they were protected from such risks. Even the IT department is sometimes lulled into a sense of security that they don’t consistently follow the required practices to keep their network secure.</p>
<p>So do you have a technology problem? Are you so dependent on technology that you have put yourself and your organisation at risk?</p>
<p>Consider the following statements:</p>
<ul>
<li>You think that technology is the only way that you can protect your information assets.</li>
<li>You constantly purchase the newest and latest security technologies to protect your network without reviewing whether the risks they address are relevant to you, or have already been addressed.</li>
<li>You have multiple technology tools that perform the same type of task, e.g. multiple anti-virus products, because &#8220;one may detect malware that the other didn&#8217;t pick up&#8221;.</li>
<li>You are unaware of what your IT and business risks are and/or you cannot identify what your critical servers and services are.</li>
<li>You think that as long as you are compliant to regulatory frameworks or standards your network is protected and your information is secure.</li>
<li>You and your users expect technology to do it all for you.</li>
</ul>
<p>If you&#8217;ve answered &#8220;true&#8221; to even a few of these statements, then you may have a technology problem. You should reassess your mindset and beliefs about information security before you have yourself, a moral hazard.</p>
<p>Original article: <a href="https://www.interxect.com/is-your-data-security-technology-a-moral-hazard/" rel="bookmark" title="Permanent link to 'Is Your Data Security Technology a Moral Hazard? <small class="subtitle">How more may be less!</small>'">Is Your Data Security Technology a Moral Hazard? <small class="subtitle">How more may be less!</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/is-your-data-security-technology-a-moral-hazard/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">726</post-id>	</item>
		<item>
		<title>IT Security and Insurance Two sides of the same coin</title>
		<link>https://www.interxect.com/it-security-and-insurance/</link>
					<comments>https://www.interxect.com/it-security-and-insurance/#comments</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Wed, 13 Feb 2013 22:35:24 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Caribbean]]></category>
		<category><![CDATA[doubt]]></category>
		<category><![CDATA[fear]]></category>
		<category><![CDATA[FUD]]></category>
		<category><![CDATA[Information technology]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[sales]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[uncertainty]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=663</guid>

					<description><![CDATA[IT Security and Insurance shares many qualities; this articles discusses how and why it might be important for you to realise that.]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-post-image wp-image-671 alignleft" alt="IT Security" src="https://www.interxect.com/main/wp-content/uploads/2013/02/Fotolia_40120476_XS-250x200.jpg" width="250" height="200" />If you were to take a look at the two, you would find similarities between IT security and the insurance industry. Maybe we should take a moment to look at that.</p>
<p>The insurance industry is based on risk and a person purchasing insurance does so based on all of the possible costs that may be incurred based on the probability of the risk occurring. So someone may spend the $50 to buy some accident insurance that has a probability of 1 in 100 happening that can may incur a cost of $1000.</p>
<p>Now securing IT is also based around the cost that may be incurred based on risk of an incident occurring. So for example if I have a piece of equipment that costs $500 that holds data that is worth $500, then I may spend $50 to secure that $1000 worth of equipment and data from a risk that has a 1 in 100 chance of happening.</p>
<p>Do you notice any similarities? Of course!<span id="more-663"></span></p>
<p>I may have oversimplified a few things, but the concept is basically the same.</p>
<p>The only thing to consider is that in insurance, they only insure you against the risk of something happening; IT security on the other hand puts mechanisms in place to minimize the risk of something happening.</p>
<p>With insurance you must take appropriate steps to prevent what to avoid it particular accident from happening, while with IT security, you’re spending money to reduce the risk of a particular threat happening.</p>
<p>The thing with IT security, as with insurance, is that you may never eliminate a risk. You may spend thousands and millions of dollars and still a risk may remain. But if you look at the similarities of IT security and insurance it doesn&#8217;t stop there.</p>
<p>Another way in which they are very similar is the way that they are sold. Have you ever been sold insurance before? I have, and I personally hate insurance agents! Insurance agents sell and fear uncertainty and doubt &#8211; FUD. They sell with statements such as, “You must think about your family,” or, “What would happen if you are sick or an accident happens and you are unable to work; how are you going to support them?”<br />
They play on fears and appeal to your darkest emotions.</p>
<p>IT security vendors play a similar game. They also use FUD to put buyers in an uneasy and uncomfortable position where they believe that their risk is much greater than they may perceive it to be. This is one of the reasons that I hate sales pitches from IT security vendors.</p>
<p>Now don&#8217;t get me wrong, I believe that IT security devices are an important part of protecting an enterprise environment. But what I also believe is that a lot of people overestimate what is required to protect their environment and, in some instances, underestimate what they should be protecting.</p>
<p>IT Security is not as simple as just throwing technology in there and thinking that you are protected.</p>
<p>IT Security involves a full holistic approach with technology, your people and executive management to bring a certain level of awareness and behaviour that will ensure a secure environment. However many businesses don&#8217;t look at the people aspect and use too much technology for their IT security needs, often based on the advice of the same IT security vendors.</p>
<p>Take my advice and take everything that IT Security vendors say with a tablespoonful of salt.</p>
<p>I understand that having a lot of IT Security systems in place helps you feel comfortable and secure. But just as <a title="Don't Buy Too Much Insurance!" href="http://online.wsj.com/article/SB10001424052970203405504576599051448432720.html" target="_blank">you can have too much insurance</a>, you can have too much IT Security systems.</p>
<p>And too much IT Security systems can have the opposite effect of what you are trying to achieve. More on that point in another article.</p>
<p>Original article: <a href="https://www.interxect.com/it-security-and-insurance/" rel="bookmark" title="Permanent link to 'IT Security and Insurance <small class="subtitle">Two sides of the same coin</small>'">IT Security and Insurance <small class="subtitle">Two sides of the same coin</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/it-security-and-insurance/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">663</post-id>	</item>
		<item>
		<title>A Tale of Two Printers How two companies, in the same business, can be totally different.</title>
		<link>https://www.interxect.com/a-tale-of-two-printers/</link>
					<comments>https://www.interxect.com/a-tale-of-two-printers/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Wed, 07 Nov 2012 21:07:41 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[printer]]></category>
		<category><![CDATA[Printing]]></category>
		<category><![CDATA[profitable]]></category>
		<category><![CDATA[staff]]></category>
		<category><![CDATA[surviving]]></category>
		<category><![CDATA[thriving]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=441</guid>

					<description><![CDATA[Two flexo-graphic printing companies, both over 25 years old, do things very differently. Compare what they do and decide which result you prefer.]]></description>
										<content:encoded><![CDATA[<p><a href="https://en.wikipedia.org/wiki/File:Victory_press.jpg" target="_blank"><img loading="lazy" decoding="async" class="zemanta-img-inserted zemanta-img-configured alignleft" title="Victory Press of Type used by SFPP" src="https://upload.wikimedia.org/wikipedia/en/thumb/4/4c/Victory_press.jpg/300px-Victory_press.jpg" alt="Victory Press of Type used by SFPP" width="240" height="193" /></a>Within the past two years I met two business owners who each owned a printing business. The printing in this case is flexo-graphic printing, the kind that prints labels for product packaging.</p>
<p>One company, Company A, opened in the late 1970&#8217;s, and the other, Company B, opened in the mid 1980&#8217;s &#8211; about seven years apart.</p>
<p>Company A is a thriving, growing business that has diversified itself in different areas, while Company B is stagnated (even shrinking) and struggling. Although Company A had a seven year head start over Company B, the place where Company B is now is nowhere close to where Company A was seven years ago.<span id="more-441"></span></p>
<p>I had the opportunity to speak to both owners about how they run their business (not at the same time of course) and here are a few things that I found.</p>
<ul>
<li>Company B focuses on low price going after customers seeking low price. Company A goes after customers who want high-value and are willing to pay a higher price.</li>
<li>Company B is using the same old printers that it had for decades. Company B has invested lots of time and money in new technology, including digital printing, continuously over the years.</li>
<li>Company B has staff that is unionized, even though it&#8217;s a very small business, and the owner constantly complains about them. Company B has staff that is diligent and loyal to the business and is not unionized, and the owner constantly praises them.</li>
<li>The owner of Company B wants to be involved in every decision and process that there is in the company. The owner of Company B delegates authority to others for getting things done.</li>
<li>Company B is trying to do the same old things and hoping to get different results. Company A continuously looks at the environment and changes its strategy to suit.</li>
</ul>
<p>You take a look at the stark differences in approach between the two businesses and think about why Company A is doing better than Company B.</p>
<p>Company B still would not listen to anyone&#8217;s advice, and still continues to struggle, but perhaps you may learn a thing or two.</p>
<p>Original article: <a href="https://www.interxect.com/a-tale-of-two-printers/" rel="bookmark" title="Permanent link to 'A Tale of Two Printers <small class="subtitle">How two companies, in the same business, can be totally different.</small>'">A Tale of Two Printers <small class="subtitle">How two companies, in the same business, can be totally different.</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/a-tale-of-two-printers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">441</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Database Caching using Disk (Request-wide modification query)

Served from: www.interxect.com @ 2025-06-13 07:41:06 by W3 Total Cache
-->