Tag Archives: Assistant

How Do You Reduce Interruptions in the Office? Three Points

Situation: A CEO of a small company finds it difficult to focus of company strategy and direction because on continuous interruptions to handle customer and company issues. Frequent phone calls and employees coming in to ask for guidance or to talk about issues make it difficult to focus on plans for the future. How do you reduce interruptions in the office?

Advice from the CEOs:

  • The company has grown to the point that it is time to build a management structure to facilitate decision-making. It’s time to delegate.
    • Identify promising individuals within the company who have the capacity to take on management responsibility. Provide them with the training to assume managerial roles and to handle direct reports.
    • If the talent is lacking in some areas, hire managers to oversee these areas.
  • The phone is the #1 problem – interruptions to deal with customer issues.
    • Hire an assistant to manage incoming calls and to transfer these calls to the appropriate department.
    • Learn to say no. For example, if an opportunity requires the CEO to be off-site to evaluate and estimate a project, that individual could not answer the phone in the office. Similarly, it is necessary to carve out concentrated time for strategic and critical tasks when in the office.
    • Explain to the team the challenge, and the benefits of spending uninterrupted time each day working on strategic direction. These benefits include additional growth and opportunity for both the company and employees.
    • Establish an official time – during regular hours – that the CEO is not available to respond to calls or other immediate needs. During these times, have an assistant direct these requests to the appropriate department or schedule time later in the day to handle an issue.
  • Any executive in a Fortune 500 company plans time for planning and other essential work when they cannot be interrupted. Working without interruptions is essential to efficient, high-quality work.

[like]

How Do You Mitigate Temporary Loss of Personnel? Five Points

Situation: The CEO of a small company is concerned that the loss of a key individual could seriously impact operations. Alternatives include adding an assistant to the affected department or cross training another individual who could serve as a short-term back-up in case of an absence of 2 weeks or more. How do you mitigate temporary loss of personnel?

Advice from the CEOs:

  • In cases like the current pandemic, planning for multi-week personnel absences is essential. Though systems are documented, subtleties of key jobs may not be documented. This is where cross-training becomes an important alternative.
  • Train another employee as a backup for the person in question and refresh the training every 2-3 months. If the company runs into an emergency due to short or longer-term loss of an individual, hire a replacement for the individual and have the individual who is cross-trained train the replacement.
  • Have the key individual and the individual who is cross training refine the ISO 9000 documentation as the key employee trains the back-up individual. This will assure that ISO 9000 documentation is being updated regularly.
  • Establish a plan with appropriate procedures that all positions must have a back-up. Include this within the company’s personnel procedures.
  • Rewarding the key individual with a bonus for selecting and training his or her back-up is the wrong thing to do. It’s both the wrong incentive and the wrong reward. Training a back-up is an essential part of each key employee’s job, not a special task that deserves separate recognition or reward.

[like]

How Do Small Companies Outsource Infrastructure? Eight Ideas

Situation: Start-ups and early-stage enterprises are typically both resource and talent constrained. The CEO of a start-up asks how others successfully outsourced infrastructure cost effectively and when they were early-stage so that they could focus on critical success factors and improve their opportunity to succeed. How do small companies outsource infrastructure?

Advice from the CEOs:

  • In the early stages of company development, outsource everything possible and focus our efforts only on the key functions.
  • In order to focus on the most important things first, decide what must be accomplished and when. Set priorities, establish key milestones and create a timeline to measure achievement. Celebrate your successes!
  • Identify the most important strategic foci within your business model and outsource everything else.
    • For example, use outside data centers instead of developing these yourself.
    • With the increase in Cloud-based options, early stage companies can do without the IT infrastructure that they used to need. Just be careful to safeguard your intellectual property!
  • Attend relevant meetings and functions to learn about existing and available capabilities. Look for local networking opportunities relevant to your market.
  • Incubator sites have developed in a number of high tech centers. These are designed to cover infrastructure needs at a reasonable cost so that founders can focus on product and service development.
  • Hire a virtual assistant – you can find these locally using a Google search.
  • Take advantage of lower cost labor and enlist younger, less experienced labor to manage databases and clean records.
  • Set up a wiki for information. This exchange is free and you can tailor it to your needs. It is permission-based; you can find it at pbwiki.com.

[like]

What Is Changing The Game in Network Security?

Interview with Philippe Courtot, CEO, Qualys

Situation: Companies experiencing security breaches and data theft are regularly in the headlines. Those launching these attacks are increasingly well organized and very creative. What is changing the game in network security and how can you respond?

Advice from Philippe Courtot:

  • The movements from enterprise software to Software as a Service (SaaS), and from mainframes to PCs to mobile devices increase the challenges of protecting enterprise environments. Therefore, a cohesive technology platform is imperative.
  • Companies are sensitive to the possibility of attack at any time. There are three principal attack vectors: breach through web applications, breach through email and browsers, and breach by device. Between PCs, iPhones and Android devices, the PC is the most closely linked to the corporate intranet while often the most vulnerable because users are lax about updating their systems and applications.
  • Attackers often target a company executive or high level administrative assistant to access the user’s profile and passwords.  In one type of attack called spear fishing, the attacker creates emails tailored to the person targeted appearing to come from a colleague or friend. When the target clicks on the email, a small piece of code is inserted in the computer, which can give control to the attacker. Another way to gain control of a computer is through physical access. An attacker can learn about a pending vacation via Facebook or twitter, providing an opportunity for home invasion. Once the attacker has access to the computer, they can plant a control program on the system. When the user returns, the attackers can make fast, brief forays inserting additional code or taking data from the enterprise network. They may use the information themselves, or sell it to others.

Given these new realities, how does a company prevent attack?

  • First, the company must thoroughly analyze and understand their vulnerabilities which are all potential entry points for an attacker. Once vulnerabilities are mapped, work on a schedule to remediate them.
  • Second, you must educate all users about the threats. This is especially critical for any personnel who have access to secure company data.
  • Third, invest in and build additional defenses to shield all remaining vulnerabilities. Make sure that employees are drilled on the defenses and that they are used. One growing trend is the use of two factor authentication, requiring employees to carry token generation devices with them to use in addition to their password. These tokens can be delivered by smart phone.

You can contact Philippe Courtot at [email protected]

Key Words:  Network, Security, Breach, Data, Theft, Response, Mainframe, PC, Mobile, Enterprise, Environment, Criminal, Government, Attack, Vector, Social Network, Email, Browser, Web, Application, Device, Spear Fishing, Executive, Assistant, Profile, Password, Vulnerability, Educate, Defense, ID

[like]