Category Archives: Security Policies and Compliance
Lean Six Sigma Implementation in IT Operations
Lean Six Sigma has been around for quite some time and is now starting to be used in IT Operations more often to provide ITSM success. The implementation of Lean Six Sigma for the most part into the daily IT Operations has been proved fruitful for companies because the strengths of Six Sigma which lies…
Best Practice Checklist For Business Continuity
No one can predict the future; however, you can be ready with a sound business continuity plan. The business continuity checklist is the first step in the BCP process. The checklist is not an exhaustive list, it is a simple tool that can be used to ensure that the basic BCP process has been initiated and the…