Tactical Advice

5 IT Failures Every Company Should Avoid

There’s a better way to manage and optimize IT. Here are five ways many organizations get tripped up.
5 IT Failures Every Company Should Avoid
Credit: iStock/ThinkStockPhotos

Experience is the best teacher, they say. And if you’ve spent the past decade working in enterprise IT, you know your way around a wide area network or two.

If you ask the world’s sharpest CIOs to name some of the most common mistakes they have come across in IT, you’re bound to hear a few “classics.”

Here are some IT blunders that your organization should avoid.

1. Failure to Engage in Proactive Network Management Practices

For far too many IT departments, network management is a reactive discipline. IT workers wait for issues to arise, wait for trouble tickets to be logged and then engage in network management practices that attempt to isolate and resolve network, server or application issues.

To meet the challenges of today’s IT environment, IT workers must learn to be increasingly proactive by deploying tools that will alert them to potential problems long before there is an actual trouble ticket in hand.

Additionally, consideration should be given for training and process development in the five major categories of network management defined by the International Organization for Standardization: fault, configuration, accounting, performance and security. The unfortunate truth is that many companies have existing tools and technologies for these key areas; they just fail to use them in a proactive manner.

2. Failure to Employ Adequate Redundancy and High Availability

A lack of network redundancy and incorrect engineering for high availability is a common (and often costly) issue.

Adequate redundancy requires a careful analysis of costs and risks. Failures in the IT infrastructure and services are inevitable; therefore, the careful addition of fault-tolerant technologies at all layers of the network is critical. Unfortunately, many organizations fail to properly study the organization’s needs and may miss the mark when it comes to implementation.

High availability can be very difficult to plan, design, implement and monitor. This is one area of IT where underestimation and poor planning can really leave an organization up a creek without a paddle. All it takes is one natural disaster or a high-profile outage to learn this painful lesson.

3. Failure to Adopt Thorough Change Control Processes

In today’s increasingly complex IT world, change is more frequent than ever. A lack of strict and well-regulated change control policies can spell disaster for an organization.

Without these safeguards in place, changes may be implemented too quickly, without proper documentation and rollback procedures. This can sacrifice portions of the network or services and ultimately lead to tremendous and embarrassing operational and financial losses when these projects fail or fall behind.

A firm policy dictating how change management works and who can authorize a change, along with an easily accessible control system for governing configuration modifications, is the best approach to keeping things in order and functioning correctly.

4. Failure to Adopt New and Emerging Technologies

Paralysis in the face of emerging technology and innovation can mean swift obsolescence for many organizations. Virtualization technology is an obvious example. For years, many IT workers were frightened by the trend and clung to physical hardware with all of its inefficiencies. This meant that their organizations missed out while nimbler, more adventurous companies reaped the massive cost savings of a virtualized environment.

What many IT workers fail to realize is that, with most new technologies, there is no need for a forklift upgrade or a complete rip-and-replace approach. Virtualization, for example, can be implemented gradually and carefully, improving the organization in phases.

It’s one thing to be cautious. After all, deploying untested technology in mission-critical areas of a company’s operations is an unwise gamble. But refusing to even dip a toe in the innovation waters guarantees you’ll be left high and dry.

5. Failure to Define and Communicate a Robust Security Policy

Many organizations today fail to define and document a comprehensive company security policy. Today’s IT workers might be able to quickly and easily configure a firewall or access control lists, but unless they know what is required by law or by the corporation's C-level executives, they can experience major problems in their organization. Worse still, they could risk losing customer data.

The security of corporate data is far too important to leave to chance. IT departments need to do a better job of raising security awareness and educating users on what they are and aren’t responsible for.

Edward Snowden has taught us the dangers of a lax or leaky security policy. IT must inform company employees on what is and isn’t allowed (for example, should transporting company data on USB memory sticks be banned?) and enforce these policies consistently. Otherwise, there will be no happily ever after if the organization is hit by a data breach.

Sign up for our e-newsletter

About the Author

Anthony Sequeira

Anthony Sequeira is an author, speaker and CBT Nuggets trainer specializing in all levels of Cisco certification. He is the co-host of a new online video training course entitled “Cisco R&S Troubleshooting Mastery,” designed to help IT administrators identify and troubleshoot the most common, challenging issues associated with Cisco routing and switching technologies. Follow him on Twitter @compsolv.

Keith Barker

Keith Barker is an author, CBT Nuggets trainer and consultant with more than 27 years of IT experience. Follow him on Twitter @KeithBarkerCCIE.

Security

Three Ways to Integrate Fire... |
Follow these tips to align the devices with log management and incident tracking systems.
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...

Storage

The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...
The Value of Converged Infra... |
Improvements in security, management and efficiency are just a few of the benefits CI can...

Networking

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Hardware & Software

New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
The Tools That Power Busines... |
Ever-evolving analytic software can greatly improve financial institutions’ decision-...