Surprisingly Universal Things Learned from Software Development

by Chris Russo | August 27, 2019 | IT Management, Process, Team, IT Support

I once ran a software development team. This was an amazing group of people who cared deeply about working as a cohesive team and doing awesome things. This was wonderful, of course, but as a manager I found that sometimes their dedication led to...

How Do You Measure Success?

Most successful people and businesses I know use measurements in their life to ensure that they are on track. Peter Drucker imparted wisdom on us when he wrote "If you can’t measure it, you can’t improve it." I know at iuvo Technologies, we measure...

Startups: Why IT Is Important & How iuvo Technologies Can Help With Growth

Human Firewalls: What They Are And Why They're Important

What is a Human Firewall?

Human Firewalls are comprised of a group of people from your organization with a mission to detect scams such as ransomware or phishing attacks that sometimes bypass your computer security systems. These attacks need a...

Port Forwarding with CISCO ASA and ASDM

Port forwarding is a critical feature of any network firewall. The ability to provide a service to the Internet requires being able to forward ports from one interface of a firewall to another interface. Sometimes these services are on dedicated IP...

Gradual Escalation in Vendor Escalation Management

I’m an author and one of the things you learn as a … writer… is to try not to repeat words, but I used “escalation” twice in the title of this post, and now I’m cringing. So, I shall now randomly expose you to a writer’s concept called “hanging a...

Documentation in Vendor Escalation

This is the sixth entry in this series on all the various complexities of managing vendor escalations. This one, however, is a super easy one. So fortunately- and rarely will you hear such a phrase from me- I can keep this one short.

The Importance of Being Available

by Chris Russo | April 09, 2019 | Process, IT Support, Core Values

In our previous post, we discussed the importance of maintaining the Moral High Ground and gave an example of the impact it can have on your support escalation adventures. In this post, we’re going to talk about the often-overlooked importance of...

A Guide to Rule-Based vs. Role-Based Access Control: What are the Differences?

As you know, network and data security are very important aspects of any organization’s overall IT planning. When it comes to implementing policies and procedures, there are a variety of ways to lock down your data, including the use of access...

Subscribe Here For Our Blogs:

Recent Posts

Categories

see all