In order for technology and processes to work, there must be PEOPLE behind them. During and after change, there needs to be PROCESSES in place in order to have success. The TECHNOLOGY should only be determined once the processes and people are already in place.
Read Moreso·cial en·gi·neer·ing
(in the context of information security) the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
"people with an online account should watch for phishing attacks and other forms of social engineering"
Read MoreWhen you are on the go, and you receive a request for your availability on your mobile …
This is a 'hack' you absolutely CANNOT do without!
“In the coming months, we’ll provide an option for you to move your non-Google Workspace paid content and most of your data to a no-cost option. This new option won’t include premium features like custom email or multi-account management. You’ll be able to evaluate this option prior to July 1, 2022 and prior to account suspension.”
Read MoreHave you turned non-essential reporting off within your organization?
Running reporting jobs, crafting business summaries, dashboards, and emails that are not even getting opened is hardly helping anyone. How many of these reporting jobs get printed, delivered via intracompany mail, only to end up untouched in a tall stack of unopened mail -- or automatically moved by a rule to an Inbox Folder, marked 'read', and never opened?
Read MoreNow is the time to improve those existing processes. OR ... perhaps establish processes where much needed ones do not exist.
Read More