SlideShare a Scribd company logo
1 of 14
Technology for the Small
Business
Donald E. Hester
CISSP, CISA, MCT, MCSE, MCSA, MCDST, Security+, CTT+
DonaldH@MazeAssociates.com
Instructor for Los Medanos College and San Diego City College
IS Manager for Maze & Associates
For SMB
 Technology can put your business at a
competitive advantage or a competitive
disadvantage
 The competitive advantage or disadvantage
comes from your choices
SMB Goals for Technology
 Technology is a tool
 That assists you in meeting your
business objectives
 Technology should help dentists be
dentists; florists be florists and
accountants be accountants
 Is technology helping you do your
job?
Case Study 1
 The small business with 3 Internet browsers
 Having 3 browsers was not helping them do
their jobs - User confusion lead to lost
productivity
 3 browsers used more system resources and
caused conflicts
 Solution a single browser that met all the
business needs - Sometimes simple is the best
solution
When you buy technology
 How do most SMB buy technology
 Do you buy the biggest and the best?
 Do you buy the cheapest?
 What should you consider when you look at
buying technology?
 What business processes do I want to enhance or
develop?
 Will this meet my businesses needs?
 What is the business reason?
Case Study 2
 The company the bought the most expensive
financial software
 Could have got the same functionality cheaper
 Did not even use all the bells and whistles
 The company that bought the cheapest
computers
 Constantly had issues with the hardware and the
manufacturer
 Ended up spending more in repairs
The nature of technology
 Technology is constantly changing and
the risks and advantages change with it
 This requires ongoing processes for
change
 Failure to dynamically change with
technology can increase the risks of
doing business
 Smaller businesses are at an advantage
because they are more agile than larger
organizations
Case Study 3
 Adopting new technology to make a
fundamental business process change, not for
the sake of it being new technology
 Upgrading from Office 2000 to Office 2003
to add collaborative features and more
interaction with our clients via the web
 Small business that starting using online
meeting services to meet with clients rather
than costly trips to clients
A complete view
 Technology does not exist in a vacuum
 Technology exists in a system
 The systems include
 Users
 Data
 Business Partners
 Customers, Clients
 Technology
 Business processes Cell
Tapping the Power
 Most businesses do not fully use the
potential of the technology they have
 Most do not know the potential of the
technology they have
 Training unleashes the potential, Unused
resources are unused potential
 Many buy the technology but not the
training – that is a mistake
Case Study 4
 The business has problems with wireless
networks, users have to change modes in and
out of the office and that causes confusion
 Wireless network was also wide open for all
outsiders to see and hack
 Business sends IT staff to wireless network
training – 6 months later, no more problems
and a secure wireless network
Computer Security
 Goals of security
 Part of all business processes
 Loss prevention - lost profits and income
 Risks
 Viruses, spy ware, malicious code, systems out of
date, espionage, accidental disclosure, snooping,
no backups, theft, natural disasters, exposure to
the elements, legal issues, fraud & hackers
Case Study 5
 The SMB without a firewall,
 Statistically a computer connected to the Internet
without protection is compromised within 15
minutes
 The SMB without antivirus protection,
 A firm’s 50 employees sat around for an entire
day while the computers where disinfected – 8
hours of lost productivity x 50 employees = waste
Summary
 Technology is a tool for your business
 There should be a good business reason for
the technology – a change of business process
 Use technology to its fullest potential - the
best way to accomplish that is training
 Computer systems must be secure – systems
that are not secure increase risk unnecessarily

More Related Content

Viewers also liked

How technology changed the way we do business
How technology changed the way we do businessHow technology changed the way we do business
How technology changed the way we do businessDOU End Muh Sunum
 
Personal hygiene-of-both-male-and-female
Personal hygiene-of-both-male-and-female Personal hygiene-of-both-male-and-female
Personal hygiene-of-both-male-and-female Assyla Neolag
 
Spurring Small Business Use of Technology and Driving Benefits
Spurring Small Business Use of Technology and Driving BenefitsSpurring Small Business Use of Technology and Driving Benefits
Spurring Small Business Use of Technology and Driving BenefitsAnn Treacy
 
Media and Social Media Training for Student-Athletes
Media and Social Media Training for Student-AthletesMedia and Social Media Training for Student-Athletes
Media and Social Media Training for Student-AthletesChris Yandle
 
Social Media Training Workshop for Small Business
Social Media Training Workshop for Small BusinessSocial Media Training Workshop for Small Business
Social Media Training Workshop for Small BusinessWeb.com
 
Business culture is changing, and so will technology, design and communication
Business culture is changing, and so will technology, design and communicationBusiness culture is changing, and so will technology, design and communication
Business culture is changing, and so will technology, design and communicationHelge Tennø
 
Role of technology in business communication 2
Role of technology in business communication 2Role of technology in business communication 2
Role of technology in business communication 2mehwish88
 
2013 Tech Trends
2013 Tech Trends2013 Tech Trends
2013 Tech Trendsfrog
 
Social Media for Time-Strapped Entrepreneurs
Social Media for Time-Strapped EntrepreneursSocial Media for Time-Strapped Entrepreneurs
Social Media for Time-Strapped EntrepreneursWe Are Social Singapore
 
Uses of technology in business communication
Uses of technology in business communicationUses of technology in business communication
Uses of technology in business communicationMushfiq Rayan
 
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...HubSpot
 
Social media training for entrepreneurs
Social media training for entrepreneursSocial media training for entrepreneurs
Social media training for entrepreneursKarim Soliman
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentationsismailraesha
 

Viewers also liked (16)

How technology changed the way we do business
How technology changed the way we do businessHow technology changed the way we do business
How technology changed the way we do business
 
Personal hygiene-of-both-male-and-female
Personal hygiene-of-both-male-and-female Personal hygiene-of-both-male-and-female
Personal hygiene-of-both-male-and-female
 
Spurring Small Business Use of Technology and Driving Benefits
Spurring Small Business Use of Technology and Driving BenefitsSpurring Small Business Use of Technology and Driving Benefits
Spurring Small Business Use of Technology and Driving Benefits
 
ICT in Business
ICT in BusinessICT in Business
ICT in Business
 
Media and Social Media Training for Student-Athletes
Media and Social Media Training for Student-AthletesMedia and Social Media Training for Student-Athletes
Media and Social Media Training for Student-Athletes
 
Social Media Training Workshop for Small Business
Social Media Training Workshop for Small BusinessSocial Media Training Workshop for Small Business
Social Media Training Workshop for Small Business
 
Business culture is changing, and so will technology, design and communication
Business culture is changing, and so will technology, design and communicationBusiness culture is changing, and so will technology, design and communication
Business culture is changing, and so will technology, design and communication
 
Role of technology in business communication 2
Role of technology in business communication 2Role of technology in business communication 2
Role of technology in business communication 2
 
2013 Tech Trends
2013 Tech Trends2013 Tech Trends
2013 Tech Trends
 
Role of IT in Business
Role of IT in BusinessRole of IT in Business
Role of IT in Business
 
Role of Information Technology in Business
Role of Information Technology in BusinessRole of Information Technology in Business
Role of Information Technology in Business
 
Social Media for Time-Strapped Entrepreneurs
Social Media for Time-Strapped EntrepreneursSocial Media for Time-Strapped Entrepreneurs
Social Media for Time-Strapped Entrepreneurs
 
Uses of technology in business communication
Uses of technology in business communicationUses of technology in business communication
Uses of technology in business communication
 
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
20 Facebook, Twitter, Linkedin & Pinterest Features You Didn't Know Existed (...
 
Social media training for entrepreneurs
Social media training for entrepreneursSocial media training for entrepreneurs
Social media training for entrepreneurs
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentations
 

More from Donald E. Hester

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGDonald E. Hester
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local GovDonald E. Hester
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About RansomwareDonald E. Hester
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows ClientDonald E. Hester
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud EnvironmentDonald E. Hester
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...Donald E. Hester
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local GovernmentsDonald E. Hester
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearDonald E. Hester
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationDonald E. Hester
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB updateDonald E. Hester
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGDonald E. Hester
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Donald E. Hester
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorDonald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Donald E. Hester
 

More from Donald E. Hester (20)

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Technology for the Small Business (2004)

  • 1. Technology for the Small Business Donald E. Hester CISSP, CISA, MCT, MCSE, MCSA, MCDST, Security+, CTT+ DonaldH@MazeAssociates.com Instructor for Los Medanos College and San Diego City College IS Manager for Maze & Associates
  • 2. For SMB  Technology can put your business at a competitive advantage or a competitive disadvantage  The competitive advantage or disadvantage comes from your choices
  • 3. SMB Goals for Technology  Technology is a tool  That assists you in meeting your business objectives  Technology should help dentists be dentists; florists be florists and accountants be accountants  Is technology helping you do your job?
  • 4. Case Study 1  The small business with 3 Internet browsers  Having 3 browsers was not helping them do their jobs - User confusion lead to lost productivity  3 browsers used more system resources and caused conflicts  Solution a single browser that met all the business needs - Sometimes simple is the best solution
  • 5. When you buy technology  How do most SMB buy technology  Do you buy the biggest and the best?  Do you buy the cheapest?  What should you consider when you look at buying technology?  What business processes do I want to enhance or develop?  Will this meet my businesses needs?  What is the business reason?
  • 6. Case Study 2  The company the bought the most expensive financial software  Could have got the same functionality cheaper  Did not even use all the bells and whistles  The company that bought the cheapest computers  Constantly had issues with the hardware and the manufacturer  Ended up spending more in repairs
  • 7. The nature of technology  Technology is constantly changing and the risks and advantages change with it  This requires ongoing processes for change  Failure to dynamically change with technology can increase the risks of doing business  Smaller businesses are at an advantage because they are more agile than larger organizations
  • 8. Case Study 3  Adopting new technology to make a fundamental business process change, not for the sake of it being new technology  Upgrading from Office 2000 to Office 2003 to add collaborative features and more interaction with our clients via the web  Small business that starting using online meeting services to meet with clients rather than costly trips to clients
  • 9. A complete view  Technology does not exist in a vacuum  Technology exists in a system  The systems include  Users  Data  Business Partners  Customers, Clients  Technology  Business processes Cell
  • 10. Tapping the Power  Most businesses do not fully use the potential of the technology they have  Most do not know the potential of the technology they have  Training unleashes the potential, Unused resources are unused potential  Many buy the technology but not the training – that is a mistake
  • 11. Case Study 4  The business has problems with wireless networks, users have to change modes in and out of the office and that causes confusion  Wireless network was also wide open for all outsiders to see and hack  Business sends IT staff to wireless network training – 6 months later, no more problems and a secure wireless network
  • 12. Computer Security  Goals of security  Part of all business processes  Loss prevention - lost profits and income  Risks  Viruses, spy ware, malicious code, systems out of date, espionage, accidental disclosure, snooping, no backups, theft, natural disasters, exposure to the elements, legal issues, fraud & hackers
  • 13. Case Study 5  The SMB without a firewall,  Statistically a computer connected to the Internet without protection is compromised within 15 minutes  The SMB without antivirus protection,  A firm’s 50 employees sat around for an entire day while the computers where disinfected – 8 hours of lost productivity x 50 employees = waste
  • 14. Summary  Technology is a tool for your business  There should be a good business reason for the technology – a change of business process  Use technology to its fullest potential - the best way to accomplish that is training  Computer systems must be secure – systems that are not secure increase risk unnecessarily

Editor's Notes

  1. Technology will either put your business at a competitive advantage or it will put your business at a competitive disadvantage Does technology put your business on a higher level playing field than your competition? Is your competition ahead of your business because of technology? Define SMB Small to Medium Business
  2. Example: Small business with three Internet browsers, 3 browsers were not helping them do their job. Sometimes simple is the best solution. User confusion lead to lost productivity.
  3. Not upgrading from office 2000 to office 2003 but a change in the fundamental process
  4. The process is the solution and technology is a tool but only part of the bigger picture
  5. Many buy the technology but not the training
  6. Company that had users go to training on how to properly train users on how to search the Internet
  7. Not if but when