Spotting Signs Your IT is Out of Date

Focus on the four primary levels of evaluation

The evolution of IT technology is advancing at breakneck speed. This evolution not only keeps the IT department in a constant state of change, but also dramatically changes the way the overall business must adapt to stay competitive.

IT technologies have rapidly morphed, including the way users consume them. Companies that hesitate to adapt will quickly fall from market leaders to laggards depending how effectively they embrace digital transformation.

But how does a leader know if the company is leading or lagging, and if its IT is out of date? While there are numerous ways to evaluate, let us focus on four primary levels, including infrastructure, applications, mobility and workplace IT.

Infrastructure

When we talk about infrastructure, first thoughts typically go to the cloud. The cloud, in essence, is a change of paradigm, not a technological change. Your company, in the past, purchased servers typically housed in your own data center. This model was based on periodic capital investments.

The maintenance might have been done by internal or external teams. Depending on a company’s approach, there was often an operational expense to support the data center too. The challenge is data centers can become outdated quickly, and you must maintain ongoing hardware investments to maintain effectivity.

If you have not already, an evaluation of completely moving to an operational model in the cloud should be conducted. Oftentimes, companies are forced to do so because some aspects of their infrastructure and applications require the cloud.

Keeping a data center on your company’s premises is a clear sign of outdated IT and not using the cloud at all is another one.

Applications

You probably have a combination of commercial off-the-shelf (COTS) business and legacy applications as well as some developed ad-hoc for your business (bespoke applications). When we talk about COT, there are two signs your systems are outdated. First, the version you use is no longer supported by the vendor, and there is not an easy way to upgrade the version.

This situation, sooner or later, will trigger tough decisions that will require an important, and potentially significant, investment. When we talk about bespoke applications, an important sign of obsolescence is when the technology used to develop your application is not used anymore in new applications and it is hard to find developers to maintain them.

The final point to mention here is licensing. Licensing models are moving more to SaaS (Software as a Service) where you pay for the whole package including software and hosting. If most of the applications you have follow an old licensing model, this might mean you are not moving at the right pace and need to rethink your applications strategy.

Applications versions, licensing models and technology used in your development will guide you on how outdated your applications ecosystem is.

Mobility

With mobility, we refer to how employees or customers can interact with the company via mobile devices. This is typically the area of greatest obsolescence in companies. In the most common failings, your employees are not able to manage their work from their mobile devices or your customers are not able to access your website in a mobile friendly way. Consumer use of mobile has overtaken the use of desktops to access services. Businesses must adapt instead of relying on laptop use.

If mobile is not a core part of your IT strategy, this means your IT has been outdated for a while already and you should define a strategy to catch up.

Workplace IT

The last, but not least, indicator of outdated IT we want to highlight is workplace IT. This addresses desktop PCs, laptops, mobile phones and workspace applications like email, telephony, video/audioconferencing, etc.

It is well understood you need a plan to renew your devices, which is usually every three years for mobile phones depending on your specific needs. You also need to have your operating system up to date to run modern applications. If you do not have an update plan, it’s a sign that the workplace is outdated. Another clear sign is if you use a hosted email system instead of a cloud system or if you still use old telephony devices instead of IP ones.

For a non-IT company, IT is becoming a service rather than a duty that the company itself manages. That can sometimes feel uncomfortable and perceived as a loss of control. But it really means IT is managed by highly specialized companies so your company can focus on your own business and customers, surely much more exciting than IT itself.

This article originally appeared in the November/December 2019 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3