All posts in IT


The Test Plan Template: Your Key to Optimizing Software Testing

The Test Plan Template Imagine if Google broke. That one day, it just stopped working.

I know it’s a scary thought…

In 2013, Google actually did break, although, only momentarily (for a whole 5 minutes to be exact). The outage affected all of its services, meaning Youtube, Gmail, Google search, Google Maps … everything stopped working.

The outcome?

Global web traffic plummeted by a whole 40% and the blip is estimated to have cost Google around $500,000.

If your product or service suddenly stops working as intended, then it’ll cost your organization a hefty sum, too.

That’s why, in this quick but informative Process Street post, you’ll learn all about test plan templates and how to use one yourself to ensure your product or service runs like a well-oiled machine. All-day, every day.

Alternatively, to jump to a specific section, click appropriate the link below:

Let’s get started! 🚀
Continue Reading

ISO 27001: The Secure Standard for Implementing & Auditing Your ISMS

iso 27001 2013

The year is 2025. Over 465 exabytes of new data is generated each day. The global cybersecurity market is worth $241 billion. Your managed services provider is still using a process document dated March 2019, and you’re starting to regret not having gone with that ISO 27001 certified provider.

Hell, at this point you’re starting to think even an in-house ISMS (Information Security Management System) implementation would have been a better option.

But I’m getting ahead of myself; let’s return to the present. Is ISO 27001 all it’s cracked up to be? Whatever your stance on ISO, it’s undeniable that many companies see ISO 27001 as a badge of prestige, and using ISO 27001 to implement (and potentially certify) your ISMS may well be a good business decision for you.

In this article, we’ll take a look at the foremost standard for information security management – ISO 27001:2013, and investigate some best practices for implementing and auditing your own ISMS.

Here is a summary of what we’ll cover in this Process Street article:

If you just want the free checklist for implementing and auditing your ISMS, you can grab that here. Otherwise, read on!
Continue Reading

Browser Security: The Best Browsers & Measures for Maximizing Online Safety

Browser Security

This is a guest post by Jack Warner. Jack is an accomplished cybersecurity expert with years of experience under his belt at TechWarn, a trusted digital agency to world-class cybersecurity companies. A passionate digital safety advocate himself, Jack frequently contributes to tech blogs and digital media sharing expert insights on topics such as whistleblowing and cybersecurity tools.

Why did you choose the browser you’re currently using?

If your answer is along the lines of “because everyone uses it“, you might want to rethink your choice.

Unfortunately, popularity is not inextricably linked to security. And in a world where cybercrime is ever more prevalent, privacy should be your utmost concern when you’re choosing a browser to surf the web. By 2021, online miscreants are expected to cause a whopping 6 billion dollars in damages. From a business perspective, you have no good reason to shoulder the risk that comes with a lack of sufficient browser security.

In this guest post for Process Street, I’ll discuss how different browsers fare at preserving your privacy and maintaining security, on top of providing ten tips to stop you and your team from falling victim to data breaches.

Read through the following sections to get clued up:

Let’s get started. 👾

Continue Reading

8 ITIL Processes for First-Class IT Service Management

itil-processes

Data-driven.

This short statement could be used to accurately summarize the way big business wants to function in today’s world.

Its all about data; gathering it, processing it, analyzing it, and then leveraging insights to continuously improve business operations and customer experiences.

And yet, despite its importance, many companies are failing to do it very well.

Information Technology Infrastructure Library (ITIL) is a framework that enables organizations (mostly enterprises and government agencies) to efficiently perform this process of leveraging data.

Of course, this is a very simple, reductionist way of putting it. The framework is incredibly complicated and how exactly it delivers such a powerful service is not easily understood.

Here is a more comprehensive definition:

“ITIL, or Information Technology Infrastructure Library, is a well-known set of IT best practices designed to assist businesses in aligning their IT services with customer and business needs. Services include IT related assets, accessibility, and resources that deliver value and benefits to customers. ITIL framework objectives include the delivery of valuable service offerings, as well as meeting customer needs, and achieving business goals of a given organization. Despite the individuality of each organization, ITIL provides guidelines for achieving these objectives and measuring success with KPIs.” – Jarod Greene, The Essential Guide to ITIL Framework and Processes

Thankfully, this vast framework can be simplified and broken down into 5 core stages, illustrated in the graphic below.

itil-framework

These categories make up the ITIL Service Lifecycle, which we here at Process Street have written an extensive post about:

I highly recommend reading this article if you would like to learn more about what exactly the ITIL service lifecycle is, how each stage relates to one another, and for valuable information on how you can apply ITIL to your business.

The article you are reading could be considered a follow up to the post linked above, as it provides you with 8 free ITIL processes in the form of practical checklists that you can integrate into your business right away.

Each of the 5 stages contains a certain number of standardized processes and functions. Processes make up the majority and are the focus of this post.

Continue Reading

The Secret to IT Service Management: The ITIL Service Lifecycle

ITIL Service Lifecycle

What do Sony Ericsson, the UK Passport Agency, MT Gox, and Knights Capital all have in common?

They’ve all suffered massive financial and reputational losses following the mismanagement, or non-existent management, of their new and existing IT services.

  • Major mobile phone operator, Sony Ericsson failed to renew one of their certificates and left 32-million people unable to use their mobile phones for a WHOLE DAY.
  • The UK Passport Agency failed to test its new computer system and left half a million British people without a passport in the UK.
  • Japanese bitcoin exchange, Mt. Gox, failed to spot several weaknesses in their software systems which enabled hackers to STEAL over 850,000 bitcoins.
  • Knight Capital Group, one of America’s largest traders, failed to spot a major bug in their trading software which cost them $440 million.

What could they have done to avoid these embarrassing, not to mention financially crippling, technical disasters?

Implemented an IT service management system, like the ITIL Service Lifecycle.

Which, coincidentally, is what this post is all about.

By the time you’ve finished reading this Process Street article, you will have answers to the following questions:

Ready? Let’s make a start…

Continue Reading

17 Service Level Agreement Examples to Track Your Service Management Metrics

service level agreement

In today’s business environment where managed services are constantly being outsourced, creating a concise, official document outlining the terms of an agreement between the client and service provider is critical to setting the foundations for a trustworthy and ultimately fruitful relationship.

“Service-level agreements, amongst other things, bolster trust in and between organizations – making it clear what needs to be done, to what standard, and when.”Adam Henshall, What is an SLA? How to Use Service-Level Agreements for Success

It’s simply an essential component that requires care and attention.

As you may well have already noticed and perhaps even put to good use, Process Street has been creating some excellent content for those of you looking to create first-class service level agreement’s in quick and easy fashion.

For a comprehensive introduction into what an SLA is, exactly what one consists of and why you need them, have a read through the following article:

If you are already familiar with the fundamentals of SLAs and are looking for guidance on how to create and edit one for your organization, you’ll find this post useful:

Bear in mind that the article referenced above also contains a free, easy-to-use Process Street template from which you can create as many service level agreements as you like.

And that’s what this post is all about – providing free, easy-to-use examples in the form of practical templates.

Continue Reading

Enterprise Mobility Management (EMM): What It Is, Why It’s Important & How to Do It

Enterprise Mobility Management

The modern workforce is, quite literally, movers and shakers.

No matter if self-bought or company-bought, employees are using mobile devices to work from while in the office, going from meeting-to-meeting, traveling cross-country to attend conferences, and even when working from home.

But for some (read: the security-minded), this is a little worrisome. With employees using personal and portable devices for work purposes, security hazards are aplenty. Theft. Security breaches. Data loss.

I needn’t go on.

It’s why 75% of CIOs view mobile security for organizations as not only a headache but a significant problem.

Though, with modern problems come modern solutions.

In this super informative post, I’ll be discussing EMM: Enterprise mobility management. It’s what every organization needs to know about, incorporate, and sustain so that its business remains security breach-free. Just read through the following sections to get acquainted with all-things EMM:

Now, let’s stop dilly-dallying and get started!

Continue Reading

How To Prevent Data Loss and Implement Data Recovery

How To Prevent Data Loss And Implement Data Recovery

Anastasia Stefanuk is a passionate writer and a marketing manager at Mobilunity. The company provides professional staffing services, so she is always aware of technology news and wants to share her experience to help tech startups and companies to be up-to-date. 

As a business person or a person who owns a computer, how prepared are you in protecting yourself against data loss?

If you lost all of your important files and memorable photos, do you think you would be able to run data recovery to reclaim them?

Data recovery is the process of salvaging lost data from either a secondary storage system, removable media or files.

In this digital era, data has been classified as the new “oil”. In the business world, data is the driving force behind innovation, competition, productivity, and improvement of core operations. Likewise, governments all over the world require data to make vital decisions that will affect their populace.

With that in mind, the convergence of data streaming from billions of mobile phones, digital platforms, virtual-reality applications, and wireless sensors, continue to pile up with each passing day. In fact, it is estimated that the amount of electronic data in existence today is 2.7 zettabytes. This number is expected to grow to 175 zettabytes by 2025.

This presents a humongous challenge in managing and ensuring that such a large amount of data is secure. In addition, the looming question in many people’s minds is; what would happen if all this data magically disappeared? Would the world come to a standstill or are there backup mechanisms where it can be retrieved later?

In this article, Process Street will expound on the main causes of data loss, the importance of backing it up, and tips on how you can successfully run data recovery processes.

This article has been broken down into the following sections.

Continue Reading

What Are Bug Bounties? The Top 20 Bounty Lists and Why They’re Useful for Companies

bug bounties

Hacking is constantly misunderstood in pop culture.

From an 11-year-old crashing Wall Street and flying through 3D landscapes in Hackers to “hacking” an entire city in Watch Dogs, it’s easy to see why it’s seen as an extreme and dangerous hobby to have.

In reality, there are plenty of “white-hat” (well-intentioned) hackers who help companies to identify security weaknesses in their programs through bug bounties.

So, to de-mystify the air around bug bounty programs and white-hat hacking, this post will show you:

  • What bug bounties are
  • How you can start earning money through them
  • What to consider when setting up your own bug bounty program
  • 20 examples of top bug bounty programs you can take inspiration from or take part in yourself

Let’s get started.

Continue Reading

The 11 Best Screen Sharing Apps (And How to Use Them)

screen sharing
Whether you’re in a meeting or doing customer support, screen sharing is one of the best ways to illustrate your point without frustrating anyone in the call.

That is if you can get an app which lets you share your screen without an issue.

We’ve all been there before – you’ve shown up early to a meeting only to have your technology die on you. Maybe the call quality was so bad you couldn’t hear each other speak or perhaps the other person was forced to download a new app before being able to see your screen.

No matter your troubles, this list will clear up which screen sharing apps are the best for you to use, why, and why other options aren’t up-to-scratch.

I’ll be covering:

  • Zoom
  • Join.me
  • Skype
  • GoToMeeting
  • Slack
  • Appear.in
  • Screenleap
  • Google Hangouts
  • Mikogo
  • Chrome Remote Desktop
  • USE Together

Ready? Let’s go.
Continue Reading

Get a free Process Street account
and take control of your workflows today.

No Credit Card Required