Skip to main content

Checklist for IT Critical Success Factors


  1. Business User Interaction - Retention as a low-cost methods to increase revenue (retention is cheaper than acquisition), Voluntary, Long-term relationships, Referrals and testimonials as powerful tools that result from Business User satisfaction or dissatisfaction (referral Business Unit users are already sold, before they even call you.)
  2. Management engagement and support - Visible & consistent support, Active role in communication & reward, Assuring linkage of information technology to corporate strategies, Clear prioritization (relative to other initiatives, programs & priorities), Use facts & data to support actions at all levels of decision-making, Creating accountability's, expectations, roles & responsibilities for the enterprise, Conducting and attending regular reviews to assure & verify progress.
  3. Projects -Establish a documented project inventory (refresh regularly), Assure linkage of projects to critical enterprise & Business Unit user needs, Establish projects of appropriate scope and size (significant savings & achievable), Assign a Champion and Black Belt to each project (and hold them accountable), Implement a project tracking system to facilitate replication & reuse, Review previous projects.
  4. Continuous improvement -Training, Skills analysis, Compelling need for change.
  5. Realistic goals and strategies - Plans & road maps, Budget forecasts, Measurable goals.
  6. Effectiveness - Empower team members so that they may deal with mistakes as they occur, Decisions are based on the best available cost, benefit & risk information, Broad based participation.
  7. Communications - Creation & communication of a human resources plan, Regular written communications on news & successes, Development & dissemination of communication aids to management, Attempt to understand the Business Unit user, commitment & communication, Business Unit users should call only once, after that they should be proactively called.
  8. Compliance/adherence to architecture & standards - Standards, Methodologies, Processes, Legal aspects.
https://www.linkedin.com/pulse/my-top-10-posts-pulse-ronald-bartels/

Comments

Popular posts from this blog

LDWin: Link Discovery for Windows

LDWin supports the following methods of link discovery: CDP - Cisco Discovery Protocol LLDP - Link Layer Discovery Protocol Download LDWin from here.

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall

Latest: updatethreatblock.sh

#!/bin/bash # # usage updatethreatblock.sh <configuration file> # eg: updatethreatblock.sh /etc/ipset-threatblock/ipset-threatblock.conf # function exists() { command -v "$1" >/dev/null 2>&1 ; } if [[ -z "$1" ]]; then   echo "Error: please specify a configuration file, e.g. $0 /etc/ipset-threatblock/ipset-threatblock.conf"   exit 1 fi # shellcheck source=ipset-threatblock.conf if ! source "$1"; then   echo "Error: can't load configuration file $1"   exit 1 fi if ! exists curl && exists egrep && exists grep && exists ipset && exists iptables && exists sed && exists sort && exists wc ; then   echo >&2 "Error: searching PATH fails to find executables among: curl egrep grep ipset iptables sed sort wc"   exit 1 fi DO_OPTIMIZE_CIDR=no if exists iprange && [[ ${OPTIMIZE_CIDR:-yes} != no ]]; then   DO_OPTIMIZE_CIDR=yes fi if [[ ! -d $(dirname &q