Categories
It support IT team structure knowledge Secrets of the IT department

Behind the drawbridge – Secrets of the IT department

Like them or loathe them, all employees will need, at some point, to interact with the support services offered by the IT department. In this series of short articles, we uncover some of the secret workings of the IT department, finding out what is jargon and what is just common sense that can apply to all of us, regardless of our role, work, or profession.

Welcome to the final instalment of our series, uncovering the mysteries of the IT realm. This time, we’re venturing into the fortress that houses our IT champions, understanding their roles and the walls they guard.

The watchful gatekeepers – Tier 1 support

Imagine a castle’s main entrance, guarded by sentries who ensure safety and provide initial guidance. Tier 1 support is pivotal, addressing common queries and directing you to the right chamber.

‘Shift-left approach unveiled

Nestled within this castle is a strategic shift – a concept called “shift-left”.

  • The heart of it – essentially, it means equipping our gatekeepers with more knowledge and tools typically reserved for inner chamber experts.
  • Your direct benefit – faster solutions without traversing multiple castle hallways. It’s as if our sentries now possess a detailed map of the entire fortress.
  • Empowering the vanguard – with extensive training, the Tier 1 team becomes adept at handling a broader range of challenges.
  • Efficiency refined: As the frontline resolves more queries, the castle’s inner sanctum experts can focus on specialised issues.

The inner circle experts – Tier 2 & Tier 3 support

Venture deeper into the castle, and you’ll encounter knights and scholars – those who handle specialised challenges. They are the ones you seek when a problem is unique or intricate.

The Grand Library – the knowledge base

Housed in a magnificent hall is a vast collection of scrolls and books – answers to frequently asked questions and detailed documentation. Before seeking an audience with experts, a visit here might provide the answers you seek.

The master builders

In the castle’s workshops, these artisans ensure the fortress remains modern, fortified, and equipped. Similarly, IT teams continuously enhance and maintain software, ensuring security and introducing new features.

Golden tips for navigating the IT castle

  • Seek with clarity
    When engaging with the gatekeepers, precise queries lead to faster solutions.
  • Patience in exploration
    Deeper chambers take time to reach but rest assured, expert guidance awaits.
  • Explore the Grand Library
    Delving into the knowledge base often illuminates answers, sparing you a lengthy quest.
  • Maintain your armour
    Regularly updating your systems ensures you’re always ready for challenges.

In this concluding piece of our enlightening journey, we’ve lifted the portcullis to the IT department’s castle, revealing its intricate chambers and dedicated inhabitants.

Over the series, as we’ve meandered through each corridor and interacted with its guardians, we hope you’ve gained a newfound appreciation for IT’s roles and expertise.

This series has built bridges of understanding, allowing you to navigate the expansive realm of IT with confidence and curiosity. Remember always to cherish the knights and scholars behind the scenes.

Links to the earlier articles can be found here:

Categories
Internet of Things Secrets of the IT department

Internet of Things explained – Secrets of the IT department

Like them or loathe them, all employees will need, at some point, to interact with the support services offered by the IT department. In this series of short articles, we uncover some of the secret workings of the IT department, finding out what is jargon and what is just common sense that can apply to all of us, regardless of our role, work, or profession.

Nothing to do with a web for spiders

Welcome to the ninth instalment in our series of IT secrets. Today, we’re looking into the world of the Internet of Things (IoT). Think of IoT like a team of scouts, each collecting bits of information from their surroundings to make smarter decisions for the group. Except, instead of scouts, they’re digital devices that are everywhere – in your home, your car, even on the factory floor. Let’s uncover how this network of connected things impacts our lives and what we can do to interact with it safely.

What is the Internet of Things?

The Internet of Things consists of smart devices that can gather data and communicate with each other over the Internet. Think of your smartphone turning off your home lights when you leave, or a sensor at a supermarket that tracks inventory levels. These devices are your eyes and ears in a digital landscape, capturing real-time data and feeding it to a more extensive system for analysis.

Key elements of IoT

  • Sensors – Imagine a weather station collecting data on temperature, humidity, and wind speed. These are your sensors in IoT, collecting raw data for analysis.
  • Connectivity – Consider a road filled with signposts directing you where to go. In the IoT realm, connectivity is that road facilitating data flow between devices.
  • Data processing – Picture an experienced chef taking essential ingredients and turning them into a gourmet meal. Data processing in IoT refines raw data into actionable insights.
  • User interface – This is like the dashboard in your car, showing your speed, fuel level, and other vital stats. In IoT, the user interface displays data in a digestible format, often on a device like a smartphone or a computer.

Top tips for navigating the IoT world safely

  1. Change default settings: Treat your IoT devices like your house. You wouldn’t keep the default lock, so change the default username and password.
  2. Regular updates: Make sure you keep the software of your devices updated, much like keeping your car well-maintained.
  3. Network segmentation: Just as you keep your valuables safe and separate from your everyday items, keep your IoT devices on a different network from your primary devices like laptops and smartphones.
  4. Two-Factor Authentication (2FA): Like using both a key and a passcode to access a secured area, enable 2FA for your IoT devices when possible.

The benefits of IoT

  • Improved efficiency: Think about a smart thermostat that learns your preferred temperatures and adjusts automatically, saving you money on energy bills.
  • Enhanced safety: Imagine a connected smoke alarm that not only sounds an alarm but also sends notifications to your phone.
  • Better decision-making: If your smartwatch tracks your sleep patterns and suggests changes, you can make informed decisions for better sleep quality.

Your thoughts?

Feel free to share your experiences and thoughts on IoT. Over the past nine articles, we’ve explored various topics ranging from the basics of IT support to cybersecurity and cloud computing. All these elements, including IoT, play crucial roles in our professional and personal lives.

Stay tuned for our final article in this enlightening series, where we will delve into another key area that affects us all, IT-related or not.

Categories
Cloud Cloud computing Secrets of the IT department Storage

Cloud computing and storage – Secrets of the IT department

Like them or loathe them, all employees will need, at some point, to interact with the support services offered by the IT department. In this series of short articles, we uncover some of the secret workings of the IT department, finding out what is jargon and what is just common sense that can apply to all of us, regardless of our role, work, or profession.

The invisible vault that’s closer than you think

Welcome to the eighth article in our enlightening IT secrets series. Today, we’re exploring the jargon-filled universe of cloud computing and storage. Forget about those fluffy white formations in the sky; we’re talking about a robust, invisible digital vault. Much like a bank secures your money, the cloud safeguards your digital belongings – documents, photos, or applications – and makes them accessible no matter where you are.

What is cloud computing and storage?

At its core, cloud computing and storage involve managing and storing data and applications over the internet rather than on physical hardware in your home or office. It’s like renting a storage unit for your furniture and personal belongings, but you’re storing digital data this time. You store your digital assets online, and the ‘landlord,’ or the cloud service provider, handles the maintenance and security. The best part? You can access these assets from anywhere in the world, as long as you have an internet connection.

Why cloud computing and storage matter

You might wonder why you need to understand cloud technology if you’re not an IT professional. Well, cloud technology is increasingly becoming a part of everyone’s life. For instance, when you collaborate with colleagues on Google Docs, you use the cloud. When you store your holiday photos on services like iCloud or Dropbox, you’re also relying on the cloud. It’s like having a digital filing cabinet that you can access anytime, anywhere, making it a practical tool for work and personal use.

Key elements of cloud computing and storage

  • Public cloud – Think of a bustling public library where you can borrow any book but can’t control who else is in the building. Similarly, a public cloud is available to everyone and maintained by providers such as Amazon AWS or Google Cloud. Because it’s shared, it’s generally less expensive but offers less control.
  • Private cloud – Imagine a members-only golf club where only members and their guests can enter. In the digital world, a private cloud is for a specific organisation. This setup provides more control over data and applications but often costs more.
  • Hybrid cloud – Consider this the wardrobe of someone who lives in a city with very varied weather. They might have sundresses, heavy coats, and everything in between. A hybrid cloud allows you to mix and match, using public for some functions and private for others, depending on your specific needs and security requirements.
  • Infrastructure as a Service (IaaS) – It’s like renting an empty shop space for your business. You get the basic walls, electricity, and plumbing, but you’ll need to bring in your inventory, cash registers, and decor. In IaaS, you rent basic computing resources on which you install your software and applications.
  • Platform as a Service (PaaS) – Imagine a co-working space where not only is the space provided but also the desks, chairs, printers, and coffee machines. PaaS offers both the infrastructure and the software tools you need to build applications.
  • Software as a Service (SaaS) – Consider this the digital equivalent of a magazine subscription. You don’t own the magazines, but you get new issues regularly that you can read. Similarly, you don’t own the software but pay a fee to use it, like Microsoft 365 or Adobe Creative Cloud.

Top tips for making the most of cloud services

  1. Understand your needs
    It’s similar to grocery shopping with a list. Knowing what you need helps you choose the right cloud services for your situation.
  2. Check security features
    Ensure the cloud service provider offers robust security features like encryption and multi-factor authentication (MFA). It’s like double-checking that a car you’re considering buying has airbags and good crash test ratings.
  3. Backup your data
    Think of this as having a first aid kit at home; it’s a safety net. Always keep a separate copy of important data stored in another location.
  4. Understand the costs
    Imagine comparing gym memberships to find the best value for what you need – pools, saunas, or specific classes. Similarly, know what you’re getting for the price you’re paying in cloud services.
  5. Use Multi-Factor Authentication (MFA)
    This is akin to having both a lock and a security camera at your front door. With MFA, even if someone guesses your password, they’ll still need a second form of verification to access your data.

The benefits of good cloud management

  • Accessibility: Imagine entering your home with a digital key that you can share with family members. In the cloud, your data is accessible from any internet-connected device, offering flexibility and convenience.
  • Cost-efficiency: Think of using a bicycle-sharing service instead of buying a bike. You use it when you need it, avoiding the cost and hassle of ownership. Cloud services are similar; you pay for what you use, eliminating the need for expensive hardware.
  • Security: Like a safe deposit box in a bank that requires multiple keys to open, reputable cloud providers have robust security measures. They use encryption, multi-factor authentication, and other tactics to protect your valuable data.
  • Scalability: Consider a house with an adjustable design where walls can be moved to create new rooms as your family grows. In the cloud, you can quickly expand your storage and services as your needs evolve, usually with just a few clicks.

A look back at the series

This article is the eighth in a series that covers everything from incident and problem management to change, asset, and service level management, as well as the critical subjects of business continuity, disaster recovery and cybersecurity.

We hope you find these insights helpful. The next topic in our series will reveal more behind-the-scenes secrets from the world of IT that directly impact each of us, whether we’re in an IT role or not.

Categories
cybersecurity Secrets of the IT department

Cybersecurity explained – Secrets of the IT department

Like them or loathe them, all employees will need, at some point, to interact with the support services offered by the IT department. In this series of short articles, we uncover some of the secret workings of the IT department, finding out what is jargon and what is just common sense that can apply to all of us, regardless of our role, work, or profession.

Cybersecurity explained

Welcome to the seventh instalment of our series. Today, we’re focusing on the topic of cybersecurity.

What is cybersecurity, and why does it matter?

Imagine cybersecurity as locking the doors and windows of your house when you leave. You wouldn’t want anyone to get in and steal your valuables. The same principle applies to the digital ‘house’ that is your computer or smartphone.

Cybersecurity is akin to a digital security system for your computer and online activities. It protects your digital assets, such as your personal information and work-related data, from risks such as hacking and phishing scams.

Key elements of cybersecurity:

These include:

  • Firewall – Imagine a security guard stationed at a building’s entrance. A firewall functions similarly, scrutinising who or what can access or leave your network to ensure only safe interactions occur. Consider it your initial shield against external threats.
  • Antivirus software – Picture your immune system warding off viruses. Antivirus software serves as your computer’s built-in defence mechanism, actively scanning and neutralising harmful files or programs.
  • Virtual Private Network (VPN) – Envision a private, secure tunnel through which your data travels. This is especially crucial when using public Wi-Fi, akin to a bustling town square where private conversations should remain private.
  • Two-factor authentication (2FA) – Think of it as a secondary lock for your door. After inputting your password, you’ll typically receive a text message with an additional code to provide an extra level of security.
  • Phishing awareness – Visualise a fisherman casting a baited hook into a pond, hoping to get a bite. Phishing emails or messages may appear legitimate but are traps set to capture your personal information. Being aware of these deceptive practices can save you considerable hassle.

Useful cybersecurity tips for everyone

  • Use strong and unique passwords
    Picture the keys to your house; you wouldn’t use a flimsy key that could easily break or be duplicated. In the same way, using strong and unique passwords makes it harder for intruders to gain unauthorised access. Combine upper and lower-case letters, numbers, and special symbols to create a robust password.
  • Be cautious with email attachments and links
    Imagine receiving a letter in the mail that you weren’t expecting. You’d likely be cautious about opening it. Apply the same caution to email attachments and links, especially from unknown sources. Hover over links to see where they lead before clicking, and scan attachments for malware if you’re unsure about the sender.
  • Be wary of public Wi-Fi
    Using public Wi-Fi is akin to having a conversation in a crowded café — you never know who might be listening. Avoid performing sensitive tasks, like online banking, when connected to a public Wi-Fi network. If you must, use a VPN for an extra layer of security.
  • Stay informed
    Knowledge of the latest cyber threats is akin to staying updated with the weather forecast. It helps you prepare for what’s coming. Follow reputable cybersecurity blogs or social media accounts to keep yourself in the loop.
  • Enable Multi-Factor Authentication (MFA) or Two-Factor Authentication (2FA)
    Consider this as adding an extra security checkpoint at an airport. After going through the initial security screening, you sometimes have to pass through additional checks. It might seem cumbersome, but it adds a crucial layer of security. In the same way, enabling MFA or 2FA on your accounts requires a second form of identification beyond just your password. This could be a text message sent to your phone or a biometric method like a fingerprint. Even if someone cracks your password, they’d still need this second piece of information to gain access.

The benefits of good cybersecurity practices

  • Data protection – Keeping your digital valuables safe is akin to locking away your jewellery or important documents in a physical safe. By using encryption techniques and secure storage solutions, you can safeguard sensitive information like your medical records or confidential business data from unauthorised access.
  • Financial security – Protecting your online bank account is as crucial as guarding a wallet full of cash. With the right cybersecurity measures like strong, unique passwords and two-factor authentication, you can drastically reduce the risk of fraud or identity theft that could otherwise drain your bank accounts or max out your credit cards.
  • Operational integrity – A cybersecurity failure can be likened to a broken lock on your front door; anyone can gain access, disrupting your daily activities. For businesses, this can mean service outages that frustrate customers and lead to loss of revenue. Solid cybersecurity protocols ensure the smooth running of personal and professional digital spaces.
  • Legal compliance – Meeting cybersecurity guidelines and regulations can save you from hefty fines and legal trouble, much like following the road rules saves you from getting a speeding ticket. Failing to protect customer data in some industries can have severe legal consequences, damaging your finances and reputation.

A look back at the series

This article is the seventh in a series that covers everything from incident and problem management to change, asset, and service level management, as well as the critical subjects of business continuity and disaster recovery.

Each instalment has been crafted to break down complex IT topics into relatable terms and scenarios, making them accessible reads for IT and non-IT folks alike. If any of these areas intrigue you, please check out the previous articles in the series.

Feel free to share your stories and insights. Our next instalment will tackle another topic that impacts us all, so stay tuned.

Categories
business continuity disaster recovery Secrets of the IT department

When disaster strikes – Secrets of the IT department

Like them or loathe them, all employees will need, at some point, to interact with the support services offered by the IT department. In this series of short articles, we uncover some of the secret workings of the IT department, finding out what is jargon and what is just common sense that can apply to all of us, regardless of our role, work, or profession.

Welcome to the sixth instalment in our series of IT secrets. This time, let’s delve into the complex worlds of disaster recovery and business continuity. Think of it as the contingency plans laid out by the emergency services for a large public gathering like the Notting Hill Carnival. There are backup routes, emergency services on standby, and contingencies for almost anything. Similarly, your IT department has its plans ready to activate at a moment’s notice.

What disaster recovery and business continuity means. Are they two different things?

While both terms often get used interchangeably, they serve different but complementary roles. Business continuity focuses on long-term plans and can include elements outside of IT, like supply chain issues or employee training. On the other hand, disaster recovery is specific to IT and aims to restore critical systems as quickly as possible after a disruption.

Why disaster recovery and business continuity matter

This might seem like IT jargon, but it’s far more universal. A robust disaster recovery and business continuity plan can positively impact every area of your work life, keeping you and your projects on track while protecting the wider organisation.

Key elements of disaster recovery and business continuity

These include:

Disaster recovery plan (DRP) – Think of a data centre responsible for operating ATMs across the UK going offline. A DRP would outline steps to restore these critical services quickly.

Business continuity plan (BCP) – Picture your local supermarket. If a power outage knocked out their refrigerators, they’d use backup generators to keep the food fresh. Just like that, a BCP focuses on ensuring that essential functions continue to operate during and after a disruption by implementing alternative plans like remote working.

Recovery time objective (RTO) – Imagine your corporate email server crashes. RTO would measure the maximum time you can afford to be without your emails before it severely impacts business. Could you go for a day or just a few hours?

Recovery point objective (RPO) – If you deleted an important work file, this measures how old the backup file can be for you to work normally. Is a backup from yesterday sufficient, or do you need one from an hour ago?

The benefits of doing this well

  • Operational resilience – Yyou’re the sort of person who knows alternative routes when there’s a tube or train strike. In the same way, a well-executed plan means your organisation adapts and recovers faster from unplanned events.
  • Financial protection – Just like having good insurance coverage for your car, a robust disaster recovery plan reduces downtime and financial losses.
  • Customer trust – If the London Underground constantly broke down, you’d lose faith in it quickly. A solid disaster recovery plan builds trust in your organisation.
  • Legal compliance – Proper planning saves you from operational headaches and potential legal issues.

Your thoughts

Feel free to share your stories and insights. The next topic in our series will focus on the basics of cybersecurity, another area that directly impacts everyone, whether you’re in IT or not.


This article is the sixth in our series that uncovers the secret workings of the IT department. We’ve covered various topics, including incident management, problem management, change management, asset management, and service level management.

Each instalment has been crafted to break down complex IT topics into relatable terms and scenarios, making them accessible reads for IT and non-IT folks alike. If any of these areas intrigue you, please check out the previous articles in the series.

Categories
Asset management Discussion topic Secrets of the IT department

The inventory you didn’t know existed – Secrets of the IT department

In this series of short articles, we uncover some of the secret workings of the IT department, finding out what is jargon and what is just common sense that can apply to all of us, regardless of our role, work, or profession.

Did you know that mismanaging IT assets could cost your company thousands of pounds? Whether you’re a fan of your IT department or not, there comes a time when everyone needs to interact with them. After exploring service level management in our last article, today we’re diving into the fascinating world of asset management.

What is asset management?

Asset management in IT is all about keeping track of the hardware and software that make your organisation tick. Think of it like organising your kitchen. You need to know where every utensil is, its condition, and when to replace it. In IT terms, hardware refers to the physical components like computers, monitors, and printers, while software includes programs like Microsoft Word or your favourite mobile app.

Why asset management matters

Organisations need effective asset management to save time, money and other resources that might otherwise be wasted on unused or redundant technology. Moreover, compliance with licenses and contracts is crucial to avoid legal ramifications.

Key elements of asset management

These include:

  1. Software licenses – ensure that your organisation legally owns the software it uses
  2. Hardware inventory – a list of all hardware devices and where they are located
  3. Lifecycle management – tracking an asset from acquisition to disposal
  4. Compliance checks – regular audits to ensure that all assets are being used per relevant laws and agreements.

The benefits of doing this well

Effective asset management isn’t just about saving money; it’s about creating a more efficient and secure environment. Just like a well-organised warehouse ensures faster customer delivery, effective asset management ensures smoother operations and better service across the board.

  • Cost savings – avoid unnecessary purchases and get the most out of your existing assets.
  • Compliance – stay within the legal boundaries of software licenses and contracts.
  • Efficiency – streamline daily operations by knowing what you have and where it is.
  • Security – identify and mitigate potential risks tied to outdated or unaccounted-for assets.

Example: A school library

Imagine asset management as a school library’s system to track books, DVDs, and computers. It would be a mess if the librarian didn’t know which items were checked out, by whom, and for how long.

Example: Your personal belongings

In a household context, consider it as keeping an inventory of your valuable belongings for insurance purposes. You would want to know what you have, its condition, and its worth.

Your thoughts

Now that you’re familiar with how asset management works behind the scenes, how does this change your perspective on the IT department and how they support you? Feel free to share your stories and insights.

This article is the fifth in our ‘Secrets of the IT Department’ series, aiming to demystify the essential elements that keep IT running smoothly. Keep an eye out for our next insightful piece.

Categories
Discussion topic Secrets of the IT department service management

Measure and improve – Secrets of the IT department

Like them or loathe them, all employees will need, at some point, to interact with the support services offered by the IT department. In this series of short articles, we uncover some of the secret workings of the IT department, finding out what is jargon and what is just common sense that can apply to all of us, regardless of our role, work, or profession.

After exploring incident, change, and problem management, it’s time to delve into how IT departments ensure that all these components work together harmoniously. Think of service level management as the local council that ensures the UK’s National Health Service, rubbish collection, and local schools operate efficiently and meet the community’s needs.

What is service level management?

Service level management involves defining, managing, and tracking the quality of IT services. It sets expectations, measures performance against them, and suggests improvements to ensure IT services meet business needs and objectives.

Why service level management matters

The quality of service provided is crucial for any organisation. It can significantly impact customer satisfaction, operational efficiency, and profitability.

Key elements of service level management

These include:

  1. Service level agreements (SLAs) – contracts that outline the quality of service expected
  2. Experience level agreements (XLAs) – these focus on the quality of the user experience, rather than just the technical metrics
  3. Key performance indicators (KPIs) – metrics used to measure and evaluate service quality
  4. Regular reviews – periodic assessments to check if services are meeting the defined expectations.

The benefits of doing this well

By employing strong service level management, organisations can realise several significant advantages, including:

  • Competitive advantage – by consistently delivering high-quality services, your organisation stands out in the market.
  • Risk mitigation – SLAs and ongoing monitoring help you identify and rectify issues before they escalate, reducing financial and reputational risks.
  • Strategic alignment – well-defined service levels help align IT operations with your organisation’s broader objectives.
  • Enhanced scalability – effective management provides the framework for scaling services up or down based on demand, enhancing operational flexibility.
  • Data-driven decision-making – metrics and KPIs provide actionable insights contributing to the organisation’s long-term success.

Example: Train services

Imagine service level management as the body that ensures UK trains run punctually, are clean, and offer good customer service. They set the benchmarks, measure performance, and implement improvements.

Example: A busy café

In a café setting, service level management would monitor how quickly customers are served, the quality of the coffee, and customer feedback. Remedial action is taken to improve the service if any of these metrics fall below the defined standards.

Your thoughts

Now that you’ve learned how service level management impacts the quality of services you interact with daily, what are your thoughts? Feel free to share your stories and insights.

This article is the fourth in our ‘Secrets of the IT Department’ series, aiming to demystify the essential elements that keep IT running smoothly. Keep an eye out for our next insightful piece.

Categories
Discussion topic Problem management Root cause Secrets of the IT department

When problems make things run more smoothly – Secrets of the IT department

Like them or loathe them, all employees will need, at some point, to interact with the support services offered by the IT department. In this series of short articles, we uncover some of the secret workings of the IT department, finding out what is jargon and what is just common sense that can apply to all of us, regardless of our role, work, or profession.

After diving into the workings of incident and change management, let’s explore another hidden secret of the IT department – this time, problem management. Think of it as the Sherlock Holmes of the IT world, based in a bustling London borough. It’s not just about responding to incidents or facilitating changes; its role is to investigate and uncover why those incidents happened in the first place.

What is problem management?

Problem management is the systematic approach to identifying the root causes of incidents, devising a fix, and preventing recurrence. Unlike incident management, which focuses on quick resolution, or change management, which ensures smooth transitions, problem management aims for long-term solutions.

Why problem management matters

Problem management aims to remove recurring incidents and minimise the impact on the services used across the company. It contributes to a more stable and reliable IT environment, saving time and money in the long run.

The problem management life cycle

The life cycle of problem management usually includes these stages:

  1. Problem identification – recognising recurring or significant incidents
  2. Problem categorisation and prioritisation – assessing the impact and urgency
  3. Root cause analysis – digging deep to find the actual cause
  4. Resolution and closure – implementing a long-term solution

Example: A leaky roof

Imagine a leaky roof in an office building. Fixing the leak is akin to incident management, but finding out why the leak happened in the first place is problem management. Was it poor construction or maybe ageing materials? Once identified, preventive measures can be put in place, using change management.

Example: The frequently crashing software

Let’s consider software that crashes frequently. Incident management will restart the software each time to restore service, but problem management will delve into why it crashes so often. Is it a bug or a hardware incompatibility? Upon finding the root cause, a permanent fix can be implemented, using change management.

The benefits of doing this well

Adopting a robust problem management strategy can lead to:

  • Operational excellence – organisations streamline their operations by identifying and eradicating root causes of incidents, leading to higher productivity and efficiency.
  • Financial savings – resolving the root causes of issues means fewer incidents and less downtime, translating into significant cost savings over time.
  • Increased customer loyalty – a stable, reliable system or service creates a better user experience, increasing customer satisfaction and loyalty.
  • Proactive risk management – identifying issues before they become incidents can mitigate potential risks, safeguarding the organisation’s reputation.
  • Business agility – understanding the root causes of problems provides valuable insights that can inform business strategy, allowing the organisation to adapt more quickly to market changes.

By embracing robust problem management, organisations resolve issues and turn them into opportunities for continual improvement.

Your thoughts

We’ve now cracked the case on problem management and its role in ensuring a hassle-free IT environment. Do you have any experiences where identifying the root cause of an issue led to a more effective, long-term solution? Share your stories and insights.

This is the third article in our ‘Secrets of the IT Department’ series. Don’t miss our future explorations into the often-overlooked facets of IT.

Categories
Change management Discussion topic Productivity Secrets of the IT department

Calm, not chaos – Secrets of the IT department

Like them or loathe them, all employees will need, at some point, to interact with the support services offered by the IT department. In this series of short articles, we uncover some of the secret workings of the IT department, finding out what is jargon and what is just common sense that can apply to all of us, regardless of our role, work, or profession.

If our previous article on incident management was your introduction to the emergency services of the IT world, then think of change management as the town planner. It’s not just about responding to emergencies but laying out the whole town or city in a way that minimises accidents and traffic jams in the first place.

What is a change management?

Change management is the coordinated approach to transitioning from one state to another, especially when introducing new services, technologies, or processes. Unlike incident management, which is reactive, change management is proactive – it aims to prevent issues before they happen.

Why change management matters

A well-managed change process minimises the risk of service disruptions and improves the system’s overall effectiveness. This means fewer incidents to manage for organisations, better productivity, and happier clients.

The change management life cycle

Similar to incident management, change management also follows a life cycle:

  1. Request for change – identifying the need for a change
  2. Assessment and planning – evaluating the impact and preparing the roadmap
  3. Implementation – rolling out the change
  4. Review – evaluating the success and any lessons learned.

Example: Introducing a new office layout

Imagine your organisation has just expanded its team, leading to a need for additional workspaces. You can’t just move desks and computers without a plan – that’s where change management comes in. It ensures that everyone has access to what they need and that the transition is as smooth as possible.

Example: Upgrading the point-of-sale system at a shop

Let’s say you run a retail shop, and you’ve decided to upgrade your point-of-sale system. If not done correctly, this could result in chaos – unhappy customers and a drop in sales. A well-managed change process would ensure that all employees are trained on the new system and that backups are in place, minimising disruptions.

The benefits of doing this well

Implementing a robust change management strategy offers several advantages:

  • Business resilience – effective change management allows your organisation to adapt quickly to market shifts, new regulations, or emerging technologies.
  • Reduced downtime – a well-executed change reduces the risk of service disruption, thereby maintaining business continuity.
  • Optimised resources – efficient change management processes mean fewer resources are wasted, leading to more cost-effective operations.
  • Enhanced stakeholder trust – when changes are managed well, it instils confidence in both employees and customers, reinforcing their trust in the organisation’s competence.
  • Data-informed decision-making – the structured approach of change management ensures that decisions are backed by comprehensive assessments, making each change a calculated, strategic move.

Effective change management isn’t just about averting disaster; it’s about positioning the organisation for greater success through well-executed modifications and improvements.

Your thoughts?

Now that you have a grip on change management, we’d love to know how you’ve experienced change in your work environment. Was it seamless, or did it lead to a cascade of incidents? Share your stories and insights.

This is the second article in our series aimed at demystifying the IT department’s inner workings. Check back for more.

Categories
Discussion topic Incident management Productivity Secrets of the IT department

Crisis, what crisis? – Secrets of the IT department

Like them or loathe them, all employees will need, at some point, to interact with the support services offered by the IT department. In this series of short articles, we uncover some of the secret workings of the IT department, finding out what is jargon and what is just common sense that can apply to all of us, regardless of our role, work, or profession.

The art of managing incidents

Incident management isn’t just industry jargon; it’s an essential process that aids organisations of all sizes swiftly and efficiently resolving unexpected issues. Picture it as the hospital A&E department for any problems that crop up, from glitches in a computer network to a broken kettle in the staff room.

What is an incident?

Simply put, an incident is an unexpected interruption or a decline in the quality of a service or process. Incidents can vary from minor inconveniences to major disruptions, impacting anything from your home Wi-Fi to a multinational firm’s data centre.

Why incident management matters

Employing a structured approach to incident management ensures that any issues are rectified in the fastest, least intrusive way possible. This not only pleases customers or employees but also preserves the organisation’s reputation while conserving time and resources.

The incident management life cycle

The life cycle of incident management typically consists of four stages:

  1. Identification – spotting the issue
  2. Classification and prioritisation – assessing its impact and urgency
  3. Investigation and diagnosis – finding out what’s wrong
  4. Response and recovery – fixing the problem and restoring normal service.

Example: The broken kettle

Picture arriving at your workplace only to discover the kettle isn’t working. In incident management, this is categorised as a low-priority incident, and someone gets tasked to sort it out.

Example: The inaccessible company website

Next, imagine if your company’s website crashes. This is a high-priority incident as without it, your company’s customers cannot buy new insurance policies or administer existing ones. A team would be hastily assembled to diagnose and remedy the problem, minimising the outage duration.

The benefits of doing this well

Implementing a top-notch incident management strategy yields many advantages:

  • Rapid recovery – effective incident management ensures that disruptions are contained quickly, limiting any negative impact on business operations.
  • Customer retention – swift resolution of issues enhances customer experience and contributes to customer loyalty.
  • Streamlined communication – a well-defined incident management process improves internal and external communication, providing timely stakeholder updates.
  • Regulatory compliance – many industries have standards for incident response times; efficient incident management helps you meet these regulations and avoid penalties.
  • Data-driven improvements – analysing past incidents can offer actionable insights that drive ongoing improvements in the IT environment and broader organisational strategy.

With excellent incident management, organisations can maintain high service quality, even when things go awry, building trust and long-term success.

Your thoughts?

Now that you’re acquainted with the fundamentals of incident management, we’re eager to hear your views. Have you ever had to manage an incident in your workplace? What approach did you take?

Does this small secret from your IT department make what they do make more sense? Does it explain why you have a good or bad impression of your IT department when you contact them for support? What do they do well? What infuriates you?