SlideShare a Scribd company logo
1 of 14
Technology for the Small
Business
Donald E. Hester
CISSP, CISA, MCT, MCSE, MCSA, MCDST, Security+, CTT+
DonaldH@MazeAssociates.com
Instructor for Los Medanos College and San Diego City College
IS Manager for Maze & Associates
For SMB
 Technology can put your business at a
competitive advantage or a competitive
disadvantage
 The competitive advantage or disadvantage
comes from your choices
SMB Goals for Technology
 Technology is a tool
 That assists you in meeting your
business objectives
 Technology should help dentists be
dentists; florists be florists and
accountants be accountants
 Is technology helping you do your
job?
Case Study 1
 The small business with 3 Internet browsers
 Having 3 browsers was not helping them do
their jobs - User confusion lead to lost
productivity
 3 browsers used more system resources and
caused conflicts
 Solution a single browser that met all the
business needs - Sometimes simple is the best
solution
When you buy technology
 How do most SMB buy technology
 Do you buy the biggest and the best?
 Do you buy the cheapest?
 What should you consider when you look at
buying technology?
 What business processes do I want to enhance or
develop?
 Will this meet my businesses needs?
 What is the business reason?
Case Study 2
 The company the bought the most expensive
financial software
 Could have got the same functionality cheaper
 Did not even use all the bells and whistles
 The company that bought the cheapest
computers
 Constantly had issues with the hardware and the
manufacturer
 Ended up spending more in repairs
The nature of technology
 Technology is constantly changing and
the risks and advantages change with it
 This requires ongoing processes for
change
 Failure to dynamically change with
technology can increase the risks of
doing business
 Smaller businesses are at an advantage
because they are more agile than larger
organizations
Case Study 3
 Adopting new technology to make a
fundamental business process change, not for
the sake of it being new technology
 Upgrading from Office 2000 to Office 2003
to add collaborative features and more
interaction with our clients via the web
 Small business that starting using online
meeting services to meet with clients rather
than costly trips to clients
A complete view
 Technology does not exist in a vacuum
 Technology exists in a system
 The systems include
 Users
 Data
 Business Partners
 Customers, Clients
 Technology
 Business processes Cell
Tapping the Power
 Most businesses do not fully use the
potential of the technology they have
 Most do not know the potential of the
technology they have
 Training unleashes the potential, Unused
resources are unused potential
 Many buy the technology but not the
training – that is a mistake
Case Study 4
 The business has problems with wireless
networks, users have to change modes in and
out of the office and that causes confusion
 Wireless network was also wide open for all
outsiders to see and hack
 Business sends IT staff to wireless network
training – 6 months later, no more problems
and a secure wireless network
Computer Security
 Goals of security
 Part of all business processes
 Loss prevention - lost profits and income
 Risks
 Viruses, spy ware, malicious code, systems out of
date, espionage, accidental disclosure, snooping,
no backups, theft, natural disasters, exposure to
the elements, legal issues, fraud & hackers
Case Study 5
 The SMB without a firewall,
 Statistically a computer connected to the Internet
without protection is compromised within 15
minutes
 The SMB without antivirus protection,
 A firm’s 50 employees sat around for an entire
day while the computers where disinfected – 8
hours of lost productivity x 50 employees = waste
Summary
 Technology is a tool for your business
 There should be a good business reason for
the technology – a change of business process
 Use technology to its fullest potential - the
best way to accomplish that is training
 Computer systems must be secure – systems
that are not secure increase risk unnecessarily

More Related Content

Viewers also liked

How technology changed the way we do business
How technology changed the way we do businessHow technology changed the way we do business
How technology changed the way we do businessDOU End Muh Sunum
 
Personal hygiene-of-both-male-and-female
Personal hygiene-of-both-male-and-female Personal hygiene-of-both-male-and-female
Personal hygiene-of-both-male-and-female Assyla Neolag
 
Spurring Small Business Use of Technology and Driving Benefits
Spurring Small Business Use of Technology and Driving BenefitsSpurring Small Business Use of Technology and Driving Benefits
Spurring Small Business Use of Technology and Driving BenefitsAnn Treacy
 
Media and Social Media Training for Student-Athletes
Media and Social Media Training for Student-AthletesMedia and Social Media Training for Student-Athletes
Media and Social Media Training for Student-AthletesChris Yandle
 
Social Media Training Workshop for Small Business
Social Media Training Workshop for Small BusinessSocial Media Training Workshop for Small Business
Social Media Training Workshop for Small BusinessWeb.com
 
Business culture is changing, and so will technology, design and communication
Business culture is changing, and so will technology, design and communicationBusiness culture is changing, and so will technology, design and communication
Business culture is changing, and so will technology, design and communicationHelge Tennø
 
Role of technology in business communication 2
Role of technology in business communication 2Role of technology in business communication 2
Role of technology in business communication 2mehwish88
 
2013 Tech Trends
2013 Tech Trends2013 Tech Trends
2013 Tech Trendsfrog
 
Social Media for Time-Strapped Entrepreneurs
Social Media for Time-Strapped EntrepreneursSocial Media for Time-Strapped Entrepreneurs
Social Media for Time-Strapped EntrepreneursWe Are Social Singapore
 
Uses of technology in business communication
Uses of technology in business communicationUses of technology in business communication
Uses of technology in business communicationMushfiq Rayan
 
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...HubSpot
 
Social media training for entrepreneurs
Social media training for entrepreneursSocial media training for entrepreneurs
Social media training for entrepreneursKarim Soliman
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentationsismailraesha
 

Viewers also liked (16)

How technology changed the way we do business
How technology changed the way we do businessHow technology changed the way we do business
How technology changed the way we do business
 
Personal hygiene-of-both-male-and-female
Personal hygiene-of-both-male-and-female Personal hygiene-of-both-male-and-female
Personal hygiene-of-both-male-and-female
 
Spurring Small Business Use of Technology and Driving Benefits
Spurring Small Business Use of Technology and Driving BenefitsSpurring Small Business Use of Technology and Driving Benefits
Spurring Small Business Use of Technology and Driving Benefits
 
ICT in Business
ICT in BusinessICT in Business
ICT in Business
 
Media and Social Media Training for Student-Athletes
Media and Social Media Training for Student-AthletesMedia and Social Media Training for Student-Athletes
Media and Social Media Training for Student-Athletes
 
Social Media Training Workshop for Small Business
Social Media Training Workshop for Small BusinessSocial Media Training Workshop for Small Business
Social Media Training Workshop for Small Business
 
Business culture is changing, and so will technology, design and communication
Business culture is changing, and so will technology, design and communicationBusiness culture is changing, and so will technology, design and communication
Business culture is changing, and so will technology, design and communication
 
Role of technology in business communication 2
Role of technology in business communication 2Role of technology in business communication 2
Role of technology in business communication 2
 
2013 Tech Trends
2013 Tech Trends2013 Tech Trends
2013 Tech Trends
 
Role of IT in Business
Role of IT in BusinessRole of IT in Business
Role of IT in Business
 
Role of Information Technology in Business
Role of Information Technology in BusinessRole of Information Technology in Business
Role of Information Technology in Business
 
Social Media for Time-Strapped Entrepreneurs
Social Media for Time-Strapped EntrepreneursSocial Media for Time-Strapped Entrepreneurs
Social Media for Time-Strapped Entrepreneurs
 
Uses of technology in business communication
Uses of technology in business communicationUses of technology in business communication
Uses of technology in business communication
 
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
 
Social media training for entrepreneurs
Social media training for entrepreneursSocial media training for entrepreneurs
Social media training for entrepreneurs
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentations
 

More from Donald E. Hester

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGDonald E. Hester
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local GovDonald E. Hester
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About RansomwareDonald E. Hester
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows ClientDonald E. Hester
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud EnvironmentDonald E. Hester
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...Donald E. Hester
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local GovernmentsDonald E. Hester
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearDonald E. Hester
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationDonald E. Hester
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB updateDonald E. Hester
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGDonald E. Hester
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Donald E. Hester
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorDonald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Donald E. Hester
 

More from Donald E. Hester (20)

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 

Recently uploaded

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Recently uploaded (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Technology for the Small Business (2004)

  • 1. Technology for the Small Business Donald E. Hester CISSP, CISA, MCT, MCSE, MCSA, MCDST, Security+, CTT+ DonaldH@MazeAssociates.com Instructor for Los Medanos College and San Diego City College IS Manager for Maze & Associates
  • 2. For SMB  Technology can put your business at a competitive advantage or a competitive disadvantage  The competitive advantage or disadvantage comes from your choices
  • 3. SMB Goals for Technology  Technology is a tool  That assists you in meeting your business objectives  Technology should help dentists be dentists; florists be florists and accountants be accountants  Is technology helping you do your job?
  • 4. Case Study 1  The small business with 3 Internet browsers  Having 3 browsers was not helping them do their jobs - User confusion lead to lost productivity  3 browsers used more system resources and caused conflicts  Solution a single browser that met all the business needs - Sometimes simple is the best solution
  • 5. When you buy technology  How do most SMB buy technology  Do you buy the biggest and the best?  Do you buy the cheapest?  What should you consider when you look at buying technology?  What business processes do I want to enhance or develop?  Will this meet my businesses needs?  What is the business reason?
  • 6. Case Study 2  The company the bought the most expensive financial software  Could have got the same functionality cheaper  Did not even use all the bells and whistles  The company that bought the cheapest computers  Constantly had issues with the hardware and the manufacturer  Ended up spending more in repairs
  • 7. The nature of technology  Technology is constantly changing and the risks and advantages change with it  This requires ongoing processes for change  Failure to dynamically change with technology can increase the risks of doing business  Smaller businesses are at an advantage because they are more agile than larger organizations
  • 8. Case Study 3  Adopting new technology to make a fundamental business process change, not for the sake of it being new technology  Upgrading from Office 2000 to Office 2003 to add collaborative features and more interaction with our clients via the web  Small business that starting using online meeting services to meet with clients rather than costly trips to clients
  • 9. A complete view  Technology does not exist in a vacuum  Technology exists in a system  The systems include  Users  Data  Business Partners  Customers, Clients  Technology  Business processes Cell
  • 10. Tapping the Power  Most businesses do not fully use the potential of the technology they have  Most do not know the potential of the technology they have  Training unleashes the potential, Unused resources are unused potential  Many buy the technology but not the training – that is a mistake
  • 11. Case Study 4  The business has problems with wireless networks, users have to change modes in and out of the office and that causes confusion  Wireless network was also wide open for all outsiders to see and hack  Business sends IT staff to wireless network training – 6 months later, no more problems and a secure wireless network
  • 12. Computer Security  Goals of security  Part of all business processes  Loss prevention - lost profits and income  Risks  Viruses, spy ware, malicious code, systems out of date, espionage, accidental disclosure, snooping, no backups, theft, natural disasters, exposure to the elements, legal issues, fraud & hackers
  • 13. Case Study 5  The SMB without a firewall,  Statistically a computer connected to the Internet without protection is compromised within 15 minutes  The SMB without antivirus protection,  A firm’s 50 employees sat around for an entire day while the computers where disinfected – 8 hours of lost productivity x 50 employees = waste
  • 14. Summary  Technology is a tool for your business  There should be a good business reason for the technology – a change of business process  Use technology to its fullest potential - the best way to accomplish that is training  Computer systems must be secure – systems that are not secure increase risk unnecessarily

Editor's Notes

  1. Technology will either put your business at a competitive advantage or it will put your business at a competitive disadvantage Does technology put your business on a higher level playing field than your competition? Is your competition ahead of your business because of technology? Define SMB Small to Medium Business
  2. Example: Small business with three Internet browsers, 3 browsers were not helping them do their job. Sometimes simple is the best solution. User confusion lead to lost productivity.
  3. Not upgrading from office 2000 to office 2003 but a change in the fundamental process
  4. The process is the solution and technology is a tool but only part of the bigger picture
  5. Many buy the technology but not the training
  6. Company that had users go to training on how to properly train users on how to search the Internet
  7. Not if but when