Jeffrey Morgan

Opinions expressed by ICN authors are their own.

Jeffrey Morgan, president of e-Volve IT Services, has been providing independent consulting services since 1993. He is the author of Enterprise Software Procurement, and he publishes the blog Information Technology for Executives.

Jeff has worked with organizations in nearly every sector, including the Department of Defense and other federal, state and local government agencies, as well as nonprofit organizations and small businesses and Fortune 500 and 100 companies in the insurance, publishing, manufacturing, medical and transportation industries.

Jeff re-engineers business and technology processes, systems and services for county and municipal governments, nonprofits, and small and midsize businesses to improve services and lower costs.

He holds a master of arts degree from the University of California, Riverside (Regents' fellow, Graduate Council fellow, 1992), and is also a graduate of the Defense Language Institute (Korean, honor graduate 1986), the U.S. Army Electronic Warfare School (distinguished graduate, 1986), and the U.S. Army Intelligence School (1986). Jeff's resume includes extensive training and experience in many areas.

The opinions expressed in this blog are those of Jeffrey Morgan and do not necessarily represent those of IDG Communications Inc. or its parent, subsidiary or affiliated companies.

HIPAA as an umbrella for county/municipal cybersecurity

HIPAA as an umbrella for county/municipal cybersecurity

Many county governments have departments or divisions that qualify as "covered entities" under HIPAA. For those organizations, it makes a great deal of sense to cover the entire enterprise under the umbrella of HIPAA rather than...

County and municipal cybersecurity, Part 2

County and municipal cybersecurity, Part 2

This is Part 2 of a two-part series for municipal executives and managers on cybersecurity. Included is a discussion of information governance (IG) and a look at frameworks, standards and regulations, including NIST, HIPAA, ISO27000...

County and municipal cybersecurity, Part 1

County and municipal cybersecurity, Part 1

This is the first part of a two-part series on cybersecurity for county and municipal organizations. In Part 1, I define major issues and obstacles specific to municipal government. In Part 2, I will offer solutions. This article was...

Is naked truth part of your business model?

Is naked truth part of your business model?

Are truth and honesty part of your organizational culture Or does your management team prefer to live in a bubble and make their own truth?

Voodoo project management

Voodoo project management

You're fired! Bogus management mumbo jumbo doesn't get projects done. Project management is a complex set of real skills that you can't learn in a 35-hour class.

On the nature of 'IT' projects

On the nature of 'IT' projects

Confusing IT projects with business projects is common – and the results are often catastrophic. Unfortunately, managers, end users and even IT professionals frequently fail to understand the distinction.

Here's why your EHR doesn't work

Here's why your EHR doesn't work

“I hope you’re not going to show me a bunch of flowcharts." This EHR project was doomed to fail from the beginning.

May I see your comprehensive security policy please?

Lack of compliance with the HIPAA security rule is common in county and municipal covered entities (CE). I provide some essential, primary source tools and documents for HIPAA security rule compliance.

We can't afford quality!

We can't afford quality!

High-quality work is expensive, but you only pay for it once. Low-quality work is unaffordable, because your organization will pay the price forever.

High crimes and misdemeanors of CIOs

High crimes and misdemeanors of CIOs

High crimes and misdemeanors are grounds for impeachment of a president. What are impeachable offenses for a CIO? Aside from losing data, providing poor service to users is one of the worst crimes a CIO can commit. Is your IT...

What is the biggest threat to internal IT departments?

What is the biggest threat to internal IT departments?

Wild-west management styles result in low value IT services. Implementing a poor man's ITIL, a PSA system, service catalogs and a service-level agreement can help.

Managing line-of-business projects

Managing line-of-business projects

How can you distinguish between a green CIO and a seasoned one? Are you an LOB expert or newby?

The ACA and the death of medical privacy

The ACA and the death of medical privacy

When you sign a release, exactly who is authorized to see your medical records? How has the ACA made matters worse?

Who should manage IT?

Who should manage IT?

What are some IT management models and how do they compare? Does it make a difference if IT is overseen by the CEO, CFO, COO or other executive?

Is management a legitimate primary skill?

Is management a legitimate primary skill?

Who on earth would give any credence to a 24-year-old management consultant? And is management even a real skill?

How to assemble a winning ERP team

How to assemble a winning ERP team

Temperamental soloists, control freaks, hijackers and empire builders can wreck your ERP project. Tips for developing and maintaining your ERP vision.

How to survive a management audit

How to survive a management audit

How would you fare if auditors walked in the door tomorrow morning and started scrutinizing all your processes, policies and procedures? Here are descriptions of several types of audits and four tips for making your management audit...

Load More