-

Disaster Recovery Planning Best Practices 2024
In 2021, a ransomware attack on Colonial Pipeline, a major fuel supplier in the US, forced the company to shut down operations for several days. This resulted in gasoline shortages and price hikes on the East Coast. Several airline companies in Britain experienced major IT failures in 2023, which resulted in thousands of canceled flights and an estimated $128 million in lost revenue. As these and numerous other examples show, the business impact of a disaster affecting the IT function can be enormous. The ability to recover information systems and data quickly and effectively after a disaster, cyberattack, or system failure should be an organizational priority. However, not many companies are consistently planning for disaster recovery.
April, 2024
-

Clinical Services Business Process Transformation 2023 Market Insights™
The Clinical Services Business Process Transformation 2023 Market Insights™ assists organizations in identifying important demand-side trends that are expected to have a long-term impact on any clinical services project. The report also highlights key challenges that enterprises face today.
May, 2023
-

IT Security Training Best Practices 2024
IT security training is a business best practice that involves training all IT and user personnel in a company’s security policies and procedures to increase awareness and ensure compliance. It is a highly advisable practice for every organization regardless of size or sector. Having well-defined IT security policies is all well and good and to be expected, but having them in place is of little value if IT personnel and users violate them or fail to be diligent in their application.
-

Cloud Governance Best Practices 2022
Cloud governance is a set of policies and practices governing an organization’s use of cloud computing to enable new capabilities and optimize cloud cost, scalability, security, compliance, and interoperability. Cloud governance should be top of mind for several organizations because it provides a complete overview of an organization’s cloud resources and how they should be managed. It is not surprising that many organizations see the vital role cloud governance plays in their daily operations, and practice rates are high compared with most best practices in our annual study.
November, 2022
-

Insider Security Risk Assessment Best Practices 2022
Most organizations are aware of the IT security threats posed by outsiders. Countermeasures such as firewalls, antivirus software, and intrusion detection systems are all aimed at these threats. Yet these measures do little to counter insider threats within the organization.
September, 2022
-

IT Vendor Governance Best Practices
IT vendor management is a function and set of practices that guide the selection, management, and assessment of IT suppliers to ensure that all parties comply with the terms of their contracts. IT supplier management has been a best practice for many years, but the disciplines have evolved. Traditional IT vendor governance practices are now inadequate to navigate the changing business ecosystem. The upshot is that most organizations need to transform their vendor governance programs. This Research Byte summarizes our full report on IT Vendor Governance Best Practices.
August, 2022
-

IT Management Best Practices 2022
The best-run IT organizations not only focus their process improvement efforts on those of other departments, they also seek to optimize their own IT management processes internally. In this study, we examine the growth and maturity of 33 IT management practices, which we have grouped into five major categories: IT governance practices, IT financial management practices, IT operational management practices, IT security and risk management practices, and application development practices. (196 pp., 178 figs.)
March, 2022
-

IT Management Best Practices 2023
The best-run IT organizations not only focus their process improvement efforts on those of other departments, they also seek to optimize their own IT management processes internally. In this study, we examine the growth and maturity of 35 IT management practices, which we have grouped into five major categories: IT governance practices, IT financial management practices, IT operational management practices, IT security and risk management practices, and application development practices.
March, 2023
-

Data Classification and Retention Adoption and Best Practices 2021
Creating a formal classification scheme is an important element in managing data for security, disaster recovery, and retention purposes. Yet, many organizations—even those that profess a commitment to protecting corporate and customer information—fail to implement data classification. This report begins by defining data classification and retention. We next study the adoption and practice levels and examine those by organization size and sector. We conclude with best-practice recommendations.
July, 2021
-

Website Accessibility Adoption and Best Practices 2021
Website accessibility is a best practice requiring the use of inclusive website design to facilitate use by people with disabilities, including visual, hearing, motor skills, or cognitive impairment. When this practice is followed formally and consistently, the experience is improved for people with disabilities who can better understand, navigate, and interact with an organization’s websites. In this report, we study the adoption and practice levels for website accessibility and examine those by organization size and sector. We conclude with practical recommendations for getting started with website accessibility.
August, 2021
-

Security Training Adoption and Best Practices 2021
Security training is a business best practice that involves the training of all IT and user personnel in a company’s security policies, procedures, and best practices to increase awareness and ensure compliance. It is a highly advisable practice for every organization. Many companies report the existence of security training, yet there is ample room for improvement. This report begins by defining security training and summarizing the main types of training available. We next study the adoption and practice levels and examine those by organization size and sector. We conclude with best-practice recommendations.
April, 2021
-

Encryption Adoption and Best Practices 2021
Encryption is a best practice for protecting sensitive or confidential information, both in storage and in transit. Data encryption software and algorithms translate data into another form, or code, so that only someone with access to a secret key—a decryption key—can read it. It has a high maturity rating, but there is ample room for improvement. This report begins with a definition of encryption. We next study the adoption and practice levels and examine those by organization size and sector. We conclude with best-practice recommendations.
February, 2021
-

How to Evaluate IT Procurement Contracts
This report serves as a primer on IT procurement contracts. Our focus is primarily on contracts for IT services, though the principles apply to any type of IT procurement. We explain the typical elements of an IT procurement contract and the major types of contracts, including various types of fixed-price and cost-reimbursable agreements.
November, 2008
-

Two-Factor Authentication Adoption and Best Practices 2020
Two-factor authentication is an IT security best practice that provides an extra layer of protection for system access. It is a highly advisable security measure, but our annual survey of IT management best practices shows that not enough companies use it formally and consistently. This report begins with a brief explanation of two-factor authentication.
February, 2020
-

Organizational Change Management Adoption and Best Practices 2019
New system projects often fail, not because of problems with the technology but because the new systems are not fully embraced by the workforce. Fortunately, there are formal methodologies that business and IT leaders can apply to establish and carry out an organizational change management program. In this report, we look at adoption trends and maturity of organizational change management by organization size and sector.
March, 2019
