Why do IT asset management programs succeed?
Part of it has to do with having the right IT, but most of the success depends on the people running the program, and how much they communicate with their team.
Here are four steps to communicating your new IT asset management policies to your coworkers.
When you’re taking steps to acquire new IT assets, you might be faced with a choice: Do I buy or do I lease?
There are a number of advantages to leasing, chief among them the chance to avoid making major one-time capital outlays. There are also a number of considerations to make before you lease.
Writing on the International Association of Information Technology Asset Managers (IAITAM) website, Jenny Schuchert lists some steps to take when leasing IT hardware.
The term “ghost assets” almost sounds like something out of a spy movie: There’s an agent that’s gone off the grid, their motives and allegiances in the shadows.
In fact, the term refers to something far more pedestrian: computers and other IT devices your organization owns, but no longer uses. They take up space, power and resources.
When you get rid of your organization’s old electronic devices, it’s important to make sure you’re not also getting rid of valuable data.
Here are a few steps to protect your data when you’re disposing of your old IT assets recommended by the International Association of Information Technology Asset Managers.
- Make sure your data is wiped
If done the right way, a data wipe is 99.999 percent effective, a percentage accepted by the U.S. Department of Defense. You can buy a data wiping program and take care of this in-house, or you can work with a company that can do this for you.
Whether your company has a few dozen mobile devices or a few hundred, one thing remains the same: those devices will eventually need to be replaced.
Do you have a plan for replacing them?
It’s important to hold your mobile devices to the same standard as other IT assets when disposing of them. They contain sensitive company and employee information, which means you need to perform a factory reset – or otherwise purge that data – or risk a pretty big vulnerability.
It’s the responsibility of your company’s mobile device asset manager to make sure those devices are clean when they leave your property.
It can be exciting, getting new computers at work. Maybe you’ll discover new bells and whistles that make your job easier, or simply find that your new machine is faster and more efficient.
But what happened to all of your old IT assets?
If they’re sitting in storage, they may be costing you money. Here are four reasons why:
When you own a business, you need to follow a host of regulations, whether they deal with providing benefits to workers, complying with safety rules or reporting income.
There are also regulations dealing with data security and IT disposition, two things you should consider before getting rid of your used IT assets.
We’ve written before about the “bring your own device trend” in the workplace, but a recent survey seems to suggest that the BYOD movement may be on the decline.
The survey, conducted by the nonprofit trade group CompTIA, found that the number of companies banning BYOD policies has grown by nearly 20 percent over the past two years, from 34 percent in 2013 to 53 percent in 2015.
“It’s not quite the death of BYOD, but there does seem to be a decrease in the use of BYOD in enterprises,” said Tim Herbert, CompTIA’s vice president for research and marketing intelligence, speaking in an interview with ComputerWorld.
There are a number of advantages to planning out how you’ll manage your company’s IT assets. Having a plan allows you to save money, boost productivity and have better access to information.
Here are five tips you can follow, courtesy of Network World, to manage your IT assets successfully:
If you see someone using a mobile device at your workplace, it most likely came from Apple.
iPhones and iPads account for nearly all of the smartphones and tablets used in the corporate world.
To make managing all of these devices easier, Apple created its Device Enrollment Program (DEP), designed to help qualifying businesses, K-12 schools, colleges and universities configure and deploy devices running on iOS and OS X.