What systems and policies have you put in place to make business employees more IT proficient and self-sufficient?

Linda Tucci Linda Tucci Profile: Linda Tucci
Tags:

11 Replies to this discussion

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members reply.
  • Kevin Beaver
    One of the best things you can do to improve this is automating things such as user provisioning, password resets, security awareness, etc. I have found that most people want to learn how to work better and more efficiently on their computers. Unfortunately, many employees/network users have yet to receive any such training - at least training that is of value. I think a smart approach might be to ask your users what they would like to see, do, and learn more of...and less of. They'll probably be pretty frank with you.
    24,640 pointsBadges:
    report
  • MDortch
    Agreed entirely with Kevin Beaver about the value of automating mundane and repetitive tasks, and of training that helps users to do their jobs better. In addition to asking users what they want and need to know, providing training in how to avoid ransomware and other malware can have multiple benefits. Informing users that they are the first line of defense for the enterprise, and that most malware enters the organization via bogus emails and Web links, will make them more secure and more "IT proficient." Such training also presents multiple opport
    35 pointsBadges:
    report
  • MDortch
    Agree completely with Kevin Beaver about the value of automation, and of user- and task-focused training. I also believe that training users about how to avoid ransomware and other malware provides multiple benefits, to users and to the enterprise at large. Much malware enters enterprise networks via bogus emails and Web links. Helping users to recognize and avoid these transforms them from malware entry points into critical elements of the enterprise's first line of defense. Such training can also help to transform the perception of IT from obstacles to enablers and accelerators of user productivity.
    35 pointsBadges:
    report
  • joeywatson
    Agreed entirely with Kevin Beaver concerning the worth of automating mundane and repetitive tasks, and of coaching that helps users to try and do their jobs higher. additionally to asking users what they need and wish to grasp, providing coaching in the way to avoid ransomware and different malware will have multiple advantages. Informing users that they're the primary line of defense for the enterprise, which most malware enters the organization via imitative emails and net links, can create them safer and additional "IT practiced." Such training conjointly presents multiple opport
    1,250 pointsBadges:
    report
  • Kevin Beaver
    Another thing I thought of - and something that most of us in IT/security have received zero training in: wisely managing our time. It's amazing how much wasted productivity I hear about and witness in the average organization. Here are some unique ways you can manage your time and help others manage theirs in order to run a better IT shop. You, your colleagues, and the business as a whole will all benefit as a result!
    24,640 pointsBadges:
    report
  • 0scorpion0
    To supplement what's already been mentioned here, and related to employee awareness and feedback, is the potential for programs in which employees provide awareness in their own fields.

    This would allow knowledge-sharing, let employees improve their presentation and interaction skills, and also gain the appreciation and recognition from colleagues.

    Top management would be sympathetic since it puts no financial strain on them!
    280 pointsBadges:
    report
  • Apatheticnow
    We've been struggling with this same challenge and are definitely looking for more feedback from the ITKE community.
    910 pointsBadges:
    report
  • namansacharles1
    Putting a database that has to control the employees at the work place and putting security to software not to be depicted by intruders as well as to to put hierarchy in the business.
    20 pointsBadges:
    report
  • VinuSRenish
    It's not very hard to bridge the gap if you follow some of these practices:
    • Make good use of cloud-based applications to streamline operations
    • Have a company Wiki that captures well all your IT related FAQ
    • Conduct regular workshops and training
    • Awards and rewards for the most IT-proficient and self-sufficient business staff 
    30 pointsBadges:
    report
  • massageku
    According me , we need build strong marketing , controll sistem and teach every one (employes) ready to grow in online area
    20 pointsBadges:
    report
  • kate123
    I agree.
    10 pointsBadges:
    report

3 Related Discussions

 

Permissions required for MESO objects?

Is Read and Write permission both required for Microsoft Exchange system objects? And why write permission? Profile: Darshan1

What is iOS

What is iOS and full form of iOS? Profile: jairampura
  • Ben Rubenstein
    Here's a definition of iOS: http://searchconsumerization.techtarget.com/definition/iOS

    Is that what you're looking for?
    11,255 pointsBadges:
    report
  • namansacharles1
    It is input output systems.
    20 pointsBadges:
    report

What is GPON?

What is GPON and some of its uses? Profile: zeshankhan
  • Michael Tidmarsh
    Welcome to ITKE, zeshankhan! Here's an article explaining passive optical network that should help you with your question. 
    59,545 pointsBadges:
    report
  • merrysmith
    PON is a point to multi-point (P2MP) passive optical network, GPON stands for Gigabit Passive Optical Networks.
    25 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following

Share this item with your network: