by Felicien | Oct 19, 2017 | Education
Whether or not you believe Kaspersky was an active partner in the recent malicious hack of NSA documents, things aren’t looking good for the security giant.
Kaspersky is in the antivirus business, and business isn’t good these days. The Russian-owned organization is at the center of the massive conspiracy around data theft from the NSA, with multiple unverified reports stating that Kaspersky software is behind the hack that allowed an unspecified number of files to be stolen from a contractor’s PC in 2015. While the investigation is still ongoing, rumors continue to cycle about potential collusion with the Russian government to reveal U.S. secrets — even potentially providing data to foreign state actors attempting to target computers containing sensitive NSA files. While there is a great deal of secrecy and suspense around the topic of Russian hackers, there’s no denying that Kaspersky’s U.S. operations have been negatively impacted by the ongoing reports.
Cybersecurity Leaks
It’s an unfortunate fact that the current challenges that Kaspersky is dealing with all lead back to a single contractor who made a bad decision to take his laptop home — and the lax security procedures that allowed him to access secure files from a remote location. It’s ironic that a massive cybersecurity company with contracts with the government and other multi-national corporations was unable to control the most basic challenge for all organizations: controlling physical access to sensitive information. Companies of all sizes are challenged with finding the right balance between allowing necessary access to data without providing employees with a way to leverage that same information in a way that will be damaging to the organization. Turns out, Kaspersky fell victim to a rogue contractor who just happened to be a Vietnamese national.
Private Contractors: Sensitive Data
With thousands of contractors and private companies making up the backbone of the security infrastructure of the government, the question remains how to adequately contain these types of leaks in the future. Aside from the relative ease of a contractor walking out of a government building with a thumb drive full of sensitive information, the fact remains that there has been a spotlight pointed on contractors since Edward Snowden’s release of internal NSA documents in 2013 to journalists. The shocking exposé severely damaged the intelligence capabilities of the U.S. as well as ruining the trust of millions in the government’s ability to protect sensitive information.
Hacking the NSA
While cybercriminals may look for ways to breach traditional organizations for monetary gain, hacking the NSA often has a more dangerous slant. The NSA actively develops listening and hacking tools themselves, that allows them to perform remote espionage without detection. These tools are critical in the ongoing war on terrorism and they allow operators to pilfer information quietly as well as break down invisible doors. When these tools were released to the broader world, they lost their efficacy which resulted in what some retired NSA officials consider a “devastating” loss of the agency and their ability to monitor the financial infrastructure of terrorist organizations.
Kaspersky’s Role in the Breach
Technically, the antivirus giant’s role in the breach is a little tenuous and involves a fair bit of theory that has yet to be proven. It’s possible that the breach didn’t even occur when the contractor took home their laptop and accessed the files. One version of the story postulates that the hack occurred earlier the same year is what provided the access to the files on the contractor’s laptop. Still, others believe that the incidents are unrelated. The vulnerability in the system was found by leveraging the standard operating procedure of uploading snippets of viruses found on systems, which was then likely identified by Russian actors who followed the trail back to the NSA files. The major outstanding question is how data that was on Kaspersky servers made its way into Russian computer networks. There is still a significant conversation insecurity and government circles around whether any breach was malicious or could simply be attributed to technical carelessness.
Release of Information
While the Wall Street Journal hasn’t gone quite as far as stating that Kaspersky was solely responsible for the NSA leak, the type of information released is important to consider. According to multiple sources, the material included “details about how the NSA penetrates foreign computer networks, the computer code it uses for such spying, and how it defends networks inside the US.” The information, obtained sometime in 2015, is said to have been stolen by hackers sponsored by Russia who targeted the contractor upon review of the contractor’s files. Unfortunately for Kaspersky, the Kaspersky AV software is thought to have been the mechanism by which the files were identified as belonging to an elite NSA group called TAO, or Tailored Access Operations group. The hacked details, along with the details in the recent Vault 7 WikiLeaks release, render many U.S. government hacking and anti-spyware tools useless or reduce their efficacy overall.
Russian Proxy or Innocent Victim?
The jury is still out on whether Kaspersky is a Russian proxy via the Wall Street Journal narrative, or simply an organization stung by weak security procedures in regards to contractors. The organization’s nationality as Russian and the recent furor around Russian interference in the election have made for great media coverage of a story that may have been buried in quieter times. It doesn’t help that Eugene Kaspersky, the fiery CEO of the organization, received training from the Russian government from an early age. As the U.S. government continues to draw back from utilizing Kaspersky tools, and corporate partners such as Best Buy and others retreat and remove products from sale, it may be that the answer doesn’t matter. The recent move by the Department of Homeland Security to direct all government organizations to stop using Kaspersky services and products doesn’t bode well for their future. However, there is still no hard evidence to be found and a lot of anonymous sources.
What has Kaspersky learned from this ordeal? Hopefully, the lesson includes the importance of maintaining the strict security of physical devices — especially when it comes to the laptops of their myriad contractors. Need help creating your own organization’s cybersecurity manual and putting processes in place to ensure enforcement?
by Felicien | Oct 18, 2017 | Education
KRACK is a bug that can affect any device with Wi-Fi capabilities. However, the news isn’t all bad. There are silver linings that come from any catastrophe.
Cybercriminals are trying to get your devices” hooked on” KRACK (the Key Reinstallation Attack)–It’s a flaw in the WPA2 protocol, the security used on wireless networks.
Since 2006, WPA2 has been used on all certified Wi-Fi hardware. It’s meant to protect the Wi-Fi connection between your computer and router by encrypting traffic using the most updated standards. What this means is simple: Your data is encrypted so anyone who sees your traffic can’t understand it because it’s a bunch of “mumbo-jumbo.” That is until now.
KRACK can “crack” your security and read your traffic (like your confidential personal and business data). Just when you think you’re safe, something else comes along to threaten your business.
Here’s the “Good, Bad, and Ugly” on KRACK.
The Good: You May Be Ok, for Now.
For those of you who like getting the good news first, here it is:
Although the quantity of people who could be affected is huge, the actual damage may be minimal.
A hacker must be within Wi-Fi range to take advantage of KRACK’s capabilities.
This is good news because it means that a hacker can’t carry out an attack over the internet from a distance, but must be physically present and within range of a network.
Plus, only one network can be exploited at any given time by one hacker. This inconvenience is your saving grace: A hacker can only attack after a lot of thought and preparation beforehand. So, for most of us, we’re likely out of the “bulls’ eye.”
Golden Rule Revisited: Stay Off Public Wi-Fi. KRACK re-enforces what you’ve been told over and over again: Don’t use public Wi-Fi. It’s not secure. It makes it all the more easy for a hacker to go to the local coffee joint and hack into your devices.
Anyone who uses Wi-Fi is susceptible. That said, a successful attack on your device may be difficult to execute. Even if successful, the reward to the hacker may be limited. If someone wants to exploit this bug to hack into your device, it would demand a lot of preparation to the point where it may not be worth it.
This bug confirms what we have always known: Don’t Use Public Wi-Fi!
The Bad: The Harm Can Still Potentially Affect You.
Everyone knows crack is bad for you, even if they consume it, they still know it’s bad. KRACK, likewise, is bad. But unfortunately, it’s not a choice, unless your choice is to live without the devices that make our lives so much more convenient.
Although you’re likely not a target of a KRACK hacker, a problem still remains: There’s a serious flaw in our devices’ security technology. Patches for the bug are required, but they weren’t immediately available. However, hours after news of KRACK was made public, Microsoft had a patch already created, while Apple and others quickly followed with their own patch. ( If you use an Android device, Netgear or other brands, you may still be waiting for a patch.)
As said, KRACK is a weakness in the WPA2 system. When the WPA2 system is weakened, a hacker can get into it, and from that access point can either eavesdrop on your traffic that’s now unencrypted, or insert ransomware or malware to compromise your computer, iPhone, or other devices.
We’re just learning about KRACK, when manufacturers have known about it for an entire month!
But access to a patch for your own devices isn’t the only problem or, for that matter, patching isn’t necessarily a solution to the problem. Does Equifax ring a bell?
That’s right. A lot of large companies have your confidential information. The likely target of a KRACK hacker is a big company. If a hacker can get into a company’s network, then access to volumes of private information can be stolen. If your information is included, then you have a battle on your hands to protect your identity, finances, and everything else that matters in the digital world we now inhabit.
The Ugly: The Future of the Internet of Things is in Question.
The Internet of Things (IoT)–That was our future. A convenient interconnection of all our devices and appliances via the Internet–Where computing devices are embedded into everyday objects so they can send and receive data. Are you low on milk? Your refrigerator can send you a text. Are you stuck in the middle of traffic and want the stove turned on or off? Just tell it to do so via your phone. It’s nice having your security camera system, too, right? You can logon and see what’s happening in and around your house. These are all conveniences that we appreciate and can use to our benefit.
But we should wait a minute and reflect. The Internet of Things and all that makes it beautiful is now a possible threat. It could be years before any of these items get their own patches. What’s more, you may not even realize they need a patch. Imagine if someone intercepted your Internet of Things devices, say your garage door opener–That’s right, the hacker can now access your home conveniently and secretly, especially if they also hacked into your security camera system.
This isn’t to say all your devices connected to Internet of Things are vulnerable (though they are); but KRACK highlights the deeply flawed security network for the Internet of Things.
KRACK reminds us that everything digital can be hacked–And once all our things become connected and digital, we can be hacked, exploited, and victimized. Every rose indeed has its thorn. We try to make life a little simpler, and we just make it more complicated.
The ugly though, is always about perspective and innovation. The tech industry has taken note of the problem KRACK revealed. Auto-updates and other measures are being assessed so that when KRACK or other bugs occur, countermeasures can quickly be put into place to reinforce security and reduce threats. These measures, however, are not currently in place, that’s the ugliest part of the problem but also an indication of a hope for a solution.
by Felicien | Oct 18, 2017 | Education
In business, one of your greatest assets is foresight. Put your planning potential to good use with a solid business continuity plan to ensure your company survives any incident, big or small.
When it comes to business, we have to foresee an entire range of potential bumps in the road. From minor challenges like toll bridges or traffic jams. To serious threats such as black ice in a sudden white out. Having an established business continuity plan in place will help you foresee potential threats to your company’s operation, prepare for these problems, ensure a speedy recovery, and mitigate major loss. Although we wish you nothing but safe travels, your company’s journey might not always cover freshly paved roads on sunny days. Follow these eight steps to creating an effective business plan so you can rest easy knowing that in the event of flat, you have a spare tire in the trunk and the tools to get you back on the road.
Identify Potential Threats– If there was ever a time for telling scary stories, this is it. An effective business continuity plan is one which prepares for a myriad of situations including minor hiccups such as a brief power outage to problems like natural disasters which completely halt operations. One of the qualities which set people apart from the animal kingdom is our exceptional ability to imagine, foresee, predict, and prepare for a countless number of possible future scenarios. This foresight is especially handy in the business world; putting it to good use in your business continuity plan will ensure you are well prepared for a host of challenges.
Have a Backup Plan – An essential part of any business continuity plan takes place prior to an actual emergency, backing up everything. Be sure all essential data has a backup located offsite. Plan an alternative power strategy (such as a spare generator), a temporary location for operations, replacements for essential supplies and equipment, and even an alternative means of communication.
Lay Out an Initial Response Protocol– This plan should specify a chain of command in the event of an emergency, and it should also designate members of an incident management or disaster recovery team. (Keep in mind that members might vary depending on the type of incident.) This ensures that anyone potentially involved in the incident knows whom to notify first and also ensures no time is wasted deciding whose responsibility it is to take charge.
Plan an Impact Assessment– During any emergency, chaos can easily overwhelm. A quick, calm impact assessment will help keep panic to a minimum. Before you can handle and contain a situation, you must understand the extent of the problem and its impact.
Take Action– The action step contains the meat of your business continuity plan. Here you must consider the potential threats and how you can best restore your company’s services, operations, and/or assets in order to control the damage. Determine a reasonable response strategy, whether you have the proper resources in place, and how you will measure, monitor, and manage the recovery response.
Communicate– During an emergency, the initial communication to those in charge and perhaps emergency responders will have already taken place. This step is to notify, inform, and update other involved parties such as the rest of management, company stakeholders, and those who will need to collaborate in order to facilitate an adequate response. Your business continuity plan should include contact information for all who might need to be involved such as emergency responders, vendors, and employees.
Make a Long-Term Plan– An incident can occur in seconds, but its impact can last for weeks, months, or even years. Consider what resources you might need in order to handle an extended response to an incident and prepare for the possibility of working with outside government entities.
Resume Business– After an incident, you might not be able to go back to business as usual. Be prepared to make changes to your company’s standard operations and procedures. Consider how you will implement these changes, facilitate necessary training, and cover the cost of finding a new normal.
As Benjamin Franklin said, “If you fail to plan, you plan to fail.” Plan for success with a business continuity plan. Taking the time to establish a thorough business continuity plan will ensure you minimize both short term and long term damages as a result of any type of incident. Not only will this save you stress in the moment, but it will also help you retain clients and customers into the future.
Draft a Solid Plan by Consulting a Professional
Our IT professionals can help you develop a solid business continuity plan for your business. We can provide you with years of expertise, experience, and the assistance you need to ensure your business carries on – no matter what sort of roadblocks you encounter. For advice regarding business continuity plans, data backup strategies, communication solutions, and more contact an experienced professional.
by Felicien | Oct 17, 2017 | Education
When you hire a managed service provider to help your company, be sure you select the right one.
Whether you just opened your doors, your business is flourishing, or your company is well-established, as a business owner you have a lot on your hands. If you are without an internal IT department and manage your own technology, then chances are you could benefit a great deal from hiring a managed service provider. With the right managed service provider, you will have more time to focus on what you do best – running your business. Selecting the best-managed service provider for your company, however, can be complicated. To ensure you choose the right company, consider the following thirteen items before deciding which managed service provider will help your business grow.
Industry Experience– Most IT professionals will be excited to face a new challenge, but it is best for your business if your managed service provider has real experience working in your industry. If you run a restaurant, then an IT expert with food service industry experience will be able to serve you much better than one who has primarily worked with accounting agencies. Industry experience ensures your managed service provider will be able to foresee potential problems and also anticipate your operational needs.
Good References– Verify the company’s industry experience and customer service skills by asking for a few references.
Longevity– You want to select a managed service provider who will be around as long as your company (hopefully forever). You can verify a provider’s history by searching for press releases, asking for financial statements, or checking with references.
Insurance– By checking that your provider is properly insured, you can be certain that the cost of any mistakes made on their part will be paid. Verify your provider has a current policy in place, just like you would for any outside vendor.
Billing Structure– The way a provider bills will affect more than your accounts payable; it can also reveal the quality of the company’s integrity. Avoid those which strictly charge by the hour, looking instead for providers who charge flat fees for certain services. For these managed service providers, doing the job right the first time is mutually beneficial.
Service Contract Scope– Be sure your provider offers a contract and list of services which covers the entire scope of your company’s needs, including computers, laptops, phones, tablets, payment systems, and even cloud computing. You do not want to get stuck in a contract with a company that cannot handle the entire job.
Agreeable Contract Terms– You also do not want to get trapped in a contract which does not have flexible terms. Look for a contract which allows you to add or remove services, or curtail service altogether without too great a penalty.
House Calls– Depending on your needs and IT skill level, a managed service provider which offers in-house service might be a real necessity.
Processes– A well-established managed service provider will have established procedures for handling various tasks. Ask what the typical course of action is when troubleshooting a problem for a client.
On-Site Availability– Find out whether the company handles all aspects of their services in-house or if they outsource.
Staff– If the managed service provider does not outsource services, then ask about their staffing levels. You want the company you choose to have enough personnel to handle your business.
Response Times– A managed service provider should be able to give you an upfront estimate of response times in any given situation. This will give you a good idea of the time it will take to fix problems which arise in the future.
Ability to Innovate– While you probably do not want your company to be the guinea pig that discovers all of the bugs in the latest technology, you also do not want to fall behind. Offering the latest services and adopting new technology early on will ultimately give your business an edge over its competition. A managed service provider which stays on top of the latest innovations and offers the most advanced options in IT will ensure your company remains contemporary, functional, and relevant.
Why Invest in a Managed Service Provider?
Your company stands to gain a great deal from selecting the right managed service provider. With your technology needs in the hands of experienced professionals, you will have more time to focus on what you do best, while your company benefits from the following:
Increased efficiency
Convenient access to knowledge, advice, and skills
Improved service and business continuity
Reduced technology-related risk
Increased IT security infrastructure
Improved regulatory compliance
Increased adaptability to technological innovations
Even though investing in a managed service provider will add an operating expense to your business, the cost is minimal compared to the benefits. With a managed service provider your company stands to benefit overall from reduced expense as a result of increased efficiency, improved production, better operations, improved products and services, and the mitigation of costly, detrimental risks.
Comprehensive IT Management Services Suited to Your Business
If you own a small to a medium-sized company and need assistance with implementing, improving, or maintaining your information technology systems, but are not prepared to hire a full-blown IT department staff, then a managed service provider might be the right solution for you. Similar to hiring an accountant to handle your taxes or a repair person to fix the air conditioning, outsourcing IT management can save you time, money, and a considerable amount of stress by eliminating the job of maintaining the network and devices you need to run your business. At {company} in {city}, our experienced IT professionals provide our clients with a comprehensive menu of IT management services.
by Felicien | Oct 17, 2017 | Education
If tomorrow’s headlines read your non-profit organization’s data and donor info was breached, what would be the ramifications? Are you taking enough appropriate steps to stop cybersecurity threats?
Is Your Charitable Organization at Risk? Cybersecurity Tips for Non-Profits
Almost weekly, we hear about an internet or computer security breach at a large retailer, bank, or recently, a major credit reporting service. These breaches create problems for not only the companies involved but for their customers. Personal information is often exposed, and the carefully crafted reputation a company may have built for years or decades can be destroyed.
As of yet, we haven’t heard of any major breaches at a non-profit organization. The key words are “as of yet.” Non-profits often store a significant amount of data about their board members, employees, volunteers, donors, corporate supporters, and more. A security breach for a non-profit will not only be embarrassing but it could have significant adverse effects on future funding. These are some of the reasons non-profits should be proactive in taking steps to button up computers and online security. Here are nine cybersecurity tips of which non-profits should take note.
Increase the difficulty of your passwords and change them at least quarterly. If your organization is using simple passwords because it is “easier”, you should keep in mind it also makes it easier for others to gain access. Many experts agree that the most secure passwords should be a random series of eight letters and numbers with at least two capital letters included in the sequence. With the frequent turnover in staff members and volunteers, passwords should be changed at least every three months. Don’t allow staff to write their passwords on Post-It notes attached to their computers. It happens.
Set security protocols for staff and volunteers in writing. Don’t assume those around you know about phishing and spear phishing and the dangers lurking behind pop-up ads and downloads. Many non-profit organizations have older volunteers who may not be aware of the latest dangers and tactics being used to gain access to data. Having staff and volunteers sign off on a one-sheeter acknowledging they understand basic security guidelines can demonstrate they are aware of the potential problems.
Upgrade security software. Of course, non-profit budgets are tight but they will get much tighter if there is a breach in your data and donors feel their information is not secure. Make it a point to get security software from a major supplier that you can feel comfortable with and keep it updated. Providing a secure firewall or malware protection after experiencing a cybersecurity attack will do little to build confidence in your organization.
Upgrade computers and hardware. The older your equipment is, the more likely it is susceptible to a cybersecurity threat. Board of directors may not be willing to invest in new computer systems just because of the bells and whistles they include. If the security of their sponsor and donor data is at risk, however, it may get their attention and provide support for new equipment. If your non-profit has not looked into TechSoup for deep discounts on software and hardware, it should. The application process can be a bit tedious but the savings are significant.
Make sure your online donation processing is impregnable. It is critical your donors have absolute confidence when making online donations. While services like PayPal are simple and relatively easy to set up, they may not instill the confidence of a more robust payment system. Giving donors payment options can also help facilitate more and more frequent donations.
Limit access to important files and data. One of the benefits of working for a non-profit is that there is often a team atmosphere, with staff and volunteers working toward a common goal. Unfortunately, this can lead to sloppy security and over-sharing of files and data. Computers may be left unlocked when not in use and unnecessary personnel may have access to sensitive files. Limiting access will not only protect your information in-house but will help in limiting external access.
Back up data on an external drive. How quickly can your organization restore current data and software if you had a significant hard drive crash? Computers are generally more stable than ever, but this can lead to a false sense of security and even complacency about backing up data. Make sure data is backed up regularly and frequently and the back up is kept off-site. This can be done in the cloud, on a CD or on an external hard drive. If the hard drive on your computer or server were to irretrievably crash today, what would the ramifications be? If you don’t know or if the word “disaster” comes to mind, create an off-site backup and restoration plan.
Get professional assistance. If you are not confident in the steps you are taking in keeping your organization’s data secure from threats, get the advice of someone experienced in the field. Discuss cybersecurity with other profit and non-profit organizations you may come in contact with and ask for recommendations. Cybersecurity doesn’t have to be that complicated when it is made a priority but if you are not comfortable taking it on, get the help of an expert.
Document the steps your organization takes to protect the security of its data. In the event of a cybersecurity attack, it won’t take long for fingers to be pointed and blame to be placed. This is why it is important to have a security plan in place and document what is being done. This can demonstrate, even after the fact, that your organization was aware of the possibility and was taking proactive steps to keep its computers and data safe. This should include how your social media is handled and who is responsible for it.
Make cybersecurity a priority, get everyone involved, and document your plan and processes. Greater awareness can go a long way in protecting the data of your non-profit organization.
by Felicien | Oct 16, 2017 | Education
Organizations everywhere are looking to technology leaders to deliver a digital strategy that drives business growth. See how transformative change can help your company succeed both now and in the future.
Organizations of all sizes throughout the world are united in a conversation around a single topic: digital business transformation. While it may mean different things to different people, leaders everywhere see the value that having a solid business technology structure in place will speed time to market, optimize efficiency and improve the overall customer experience — ultimately leading to improved sales, business growth and reduced costs. However, there are significant challenges that must be overcome throughout any business transformation project, and having a solid strategy is the first step towards a successful effort.
Going Digital
Whether it’s an initial push to go paperless in an office, or an upgrade of legacy ERP or other software, going digital is gaining steam for companies. A recent Gartner study noted that CIOs intended to spend nearly 30 percent of their budget on digital transformation in the next year, a staggering number that clearly indicates the upfront costs associated with moving through digital transformation. It’s expected that this number will sustain for several years, as organizations look to transform the way they do business and embrace the new technology that is allowing startups to thrive. Smart CIOs recognize that upgrading technology without business intervention is not going to take the business where it needs to go. Instead, the strategy should be the driving force behind the digital business transformation.
The Role of Strategy
A strategy is a key driver in the digital arena, with companies needing to take significant risks in order to obtain the huge payoffs that come with a digital shift. Leaders who are able to foster a culture of change throughout the organization are more likely to be able to gain buy-in on a strategy to re-imagine the business from a technical perspective. Adoption depends in large part on where the organization is in their digital maturity: more mature organizations tend to have a more robust strategy, while those just beginning the journey of digital transformation may start with a small sub-section of the organization and place their focus there. The learning from companies who are able to make the leap is that if your organization is able to support the rapid change necessary, broadening the scope of your transformation efforts — in concert with a clearly defined strategy with executive buy-in — will accelerate change and provide you the best opportunity for success. Perhaps the step that can be most challenging to organizations who are attempting to develop a comprehensive digital strategy is to prepare to sunset operations or business processes that no longer fit with the core competency and future vision of the company.
Where Strategy Resides
Employees are actively looking for organizations who are willing to support strategic risk-takers and are likely to flock from companies where the measured risk appetite is low or nonexistent. Hence, a detailed and comprehensive digital strategy is critical to ensure the success of any business transformation initiative. That begs the question: Where does this strategy begin? In the technology side of the business, or within marketing? There can be arguments made for the strategy to be driven on either side of the business, but what is evident is that CIOs are finding their jobs changing significantly and a tighter partnership with their CMOs. The continued integration of intelligent machines and advanced analytics require CIOs to look beyond simple delivery of business needs to the holistic customer experience across various channels.
Prevalence of Analytics
Another key factor for success is ensuring that you have a spotlight locked onto analytics and a firm understanding of how to make them measurable and actionable. Many strategic initiatives have been derailed due to too many data points that pointed leadership in the wrong direction or sent mid-level managers scurrying after unattainable goals that didn’t impact the core of the organization. When you create a stringent environment that ensures focus only on the metrics that support operational excellence in your core competencies, these numbers have the power to drive transformation to the deepest levels of the organization. For instance, look at Sprint, a large organization that has been losing ground for years to larger competitors. After years of focusing on cost reduction, Sprint’s leadership took a supremely different stance and decided to invest in technology platforms that would support an enhanced customer experience. The sheer quantity of data generated by an organization of that size can be staggering, but with terabytes of data to wade through the team was able to determine where operations could be tightened from a transactional perspective. This includes everything from improving the online buying proposition to reducing system glitches that were frustrating staff. Today, Sprint’s operations are still a work in progress, but the upfront wins encouraged leadership to stay behind the project and more teams to look for ways to consolidate data silos found throughout the organization.
Managing Technology Disruption
Any large business transformation project is going to cause disruption. However, that disruption can be carefully managed through solid support from leadership as well as mid-level managers and directors. People as a whole fear change, making clear communication of the utmost importance at each step of the process. Listening to the customer is more important than ever, as crucial knowledge can be gained simply by asking those who know and love your business what is needed to improve the experience of working with you. Part of building the strategy includes building alignment, from the needs of the customers, through the daily tasks of the individuals — all tied to the corporate goals and objectives that will bring true transformative change to the organization.
Building a successful digital business transformation strategy doesn’t happen overnight. It’s a process that involves individuals at all levels of the organization. Whether you need help starting or continuing a project of this scale or need technology in place to support your business needs, contact us today.