Risk assessments for local governments and SMBs

Risk assessments for local governments and SMBs

Does your organization have a mature risk management program or are your just crossing your fingers and hoping for the best? Risk assessments are an essential part of your information and IT governance programs.

05/23/17

Municipal shared services agreements for information technology

Municipal shared services agreements for information technology

Are shared IT services for municipalities a good deal? What are the risks and do they really save money or will you be stuck with a nightmare scenario from which you can never extricate your organization?

05/15/17

County/municipal IT customer service and the RACI model

County/municipal IT customer service and the RACI model

Do you assume that your managers and staff members will apply common sense to daily operational activities? If so, you may be in trouble. Let's look at how you can use the RACI model and other IT governance tools to address the...

05/09/17

Information governance for counties and municipalities

Information governance for counties and municipalities

Most county and municipal governments don't have formal information governance programs, but adoption of IG would reduce risks, lower costs and vastly improve quality of services in these organizations.

04/27/17

HIPAA as an umbrella for county/municipal cybersecurity

HIPAA as an umbrella for county/municipal cybersecurity

Many county governments have departments or divisions that qualify as "covered entities" under HIPAA. For those organizations, it makes a great deal of sense to cover the entire enterprise under the umbrella of HIPAA rather than...

04/11/17

County and municipal cybersecurity, Part 2

County and municipal cybersecurity, Part 2

This is Part 2 of a two-part series for municipal executives and managers on cybersecurity. Included is a discussion of information governance (IG) and a look at frameworks, standards and regulations, including NIST, HIPAA, ISO27000...

04/03/17

County and municipal cybersecurity, Part 1

County and municipal cybersecurity, Part 1

This is the first part of a two-part series on cybersecurity for county and municipal organizations. In Part 1, I define major issues and obstacles specific to municipal government. In Part 2, I will offer solutions. This article was...

03/27/17

Is naked truth part of your business model?

Is naked truth part of your business model?

Are truth and honesty part of your organizational culture Or does your management team prefer to live in a bubble and make their own truth?

01/31/17

Voodoo project management

Voodoo project management

You're fired! Bogus management mumbo jumbo doesn't get projects done. Project management is a complex set of real skills that you can't learn in a 35-hour class.

01/20/17

On the nature of 'IT' projects

On the nature of 'IT' projects

Confusing IT projects with business projects is common – and the results are often catastrophic. Unfortunately, managers, end users and even IT professionals frequently fail to understand the distinction.

11/17/16

Here's why your EHR doesn't work

Here's why your EHR doesn't work

“I hope you’re not going to show me a bunch of flowcharts." This EHR project was doomed to fail from the beginning.

11/10/16

May I see your comprehensive security policy please?

Lack of compliance with the HIPAA security rule is common in county and municipal covered entities (CE). I provide some essential, primary source tools and documents for HIPAA security rule compliance.

10/31/16

We can't afford quality!

We can't afford quality!

High-quality work is expensive, but you only pay for it once. Low-quality work is unaffordable, because your organization will pay the price forever.

10/21/16

High crimes and misdemeanors of CIOs

High crimes and misdemeanors of CIOs

High crimes and misdemeanors are grounds for impeachment of a president. What are impeachable offenses for a CIO? Aside from losing data, providing poor service to users is one of the worst crimes a CIO can commit. Is your IT...

10/17/16

What is the biggest threat to internal IT departments?

What is the biggest threat to internal IT departments?

Wild-west management styles result in low value IT services. Implementing a poor man's ITIL, a PSA system, service catalogs and a service-level agreement can help.

10/03/16

Managing line-of-business projects

Managing line-of-business projects

How can you distinguish between a green CIO and a seasoned one? Are you an LOB expert or newby?

09/21/16

The ACA and the death of medical privacy

The ACA and the death of medical privacy

When you sign a release, exactly who is authorized to see your medical records? How has the ACA made matters worse?

08/02/16

Who should manage IT?

Who should manage IT?

What are some IT management models and how do they compare? Does it make a difference if IT is overseen by the CEO, CFO, COO or other executive?

07/28/16

Is management a legitimate primary skill?

Is management a legitimate primary skill?

Who on earth would give any credence to a 24-year-old management consultant? And is management even a real skill?

07/15/16

How to assemble a winning ERP team

How to assemble a winning ERP team

Temperamental soloists, control freaks, hijackers and empire builders can wreck your ERP project. Tips for developing and maintaining your ERP vision.

06/20/16

Load More