Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Keep IT and the Rest of Your Staff on the Same Side

How to Keep IT and the Rest of Your Staff on the Same Side

There are some facets to IT that are universally accepted as important, such as security. However, there are also others that create some conflicting opinions between management and IT personnel. When surveyed, business leaders and IT management held vastly different opinions as to the importance of various IT tasks. Is there a way to unify these priorities?

Different Viewpoints and Priorities
According to the 2018 SIM (Society for Information Management) IT Trends Study, management and IT have very different views on how important many tasks are. The 1,200 respondents to the survey indicated that while business owners and management saw alignment between the business and IT as the second-highest priority, IT saw that as their fourth priority. Talent retention was another point where business leadership and IT didn’t quite see eye-to-eye. IT teams ranked that as worry number three, while business leaders ranked it as 17th. Business continuity saw a similar discrepancy, IT leaders ranking it at number eight, while business leaders ranked it 18th.

This isn’t a situation that benefits any business. Instead, the focus should be to align the priorities of IT and the rest of the business in order to achieve a greater, common goal.

Blending Two Priorities into a Common Goal
An effective means of getting the different facets of your team on the same page is to show them that they are all contributing to the success of the same business initiative. For instance, finances are a major concern of any business’ management. An IT team can much more easily communicate with the business side of things by speaking their language, so to speak.

Any IT team understands the importance of staying up-to-date where their solutions are concerned, but staying up-to-date will require an investment that management may resist signing off on. However, if the IT team can demonstrate how the investment into upgrades will allow the business to save money down the line, it provides the business half with the motivation to move forward. The same effect can often be accomplished with a frank, honest evaluation of the business’ future if certain investments aren’t made.

Win-Win or Lose-Lose
It is also important to cultivate the idea amongst your organization that the business half and the IT half should not be considered competitors. The two need to be partners, working together to make the best whole possible.

If there is ever a dispute or disagreement between the two halves of your business, resist the urge to find a compromise. Disagreement can be a good thing, as it provides the opportunity to examine a situation and define the best possible course of action for the business as a whole. This opens the door for more effective collaboration.
Compromise and collaboration are two very different things. While compromise suggests that both sides have to sacrifice something for any agreement to take shape, collaboration implies that both sides are unifying and putting forth their best effort to achieve a common goal--in this case, the betterment of the organization.

How have you found success in encouraging collaboration between your IT teams and the rest of your staff? Tell us in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Hackers Privacy Email Malware Business Internet Hosted Solutions Business Computing Microsoft Windows 10 Computer Software IT Services Backup Android Ransomware Network Security Smartphone Small Business Google Hardware Mobile Devices Windows User Tips Productivity Gmail Data Browser Data Management Facebook App Encryption Office 365 Upgrade Smartphones Saving Money Efficiency Phishing Business Continuity Internet of Things Remote Monitoring Workplace Tips Cloud Computing Outsourced IT Innovation Data Recovery Microsoft Office Big Data Office Tips IT Support Word Artificial Intelligence Managed IT Services Tip of the week Managed Service Provider Two-factor Authentication IT Support Server Apple Settings Content Filtering Government Employer-Employee Relationship Robot Risk Management Antivirus Cybersecurity WiFi Spam Miscellaneous Chrome Data storage Social Media Business Management Windows 10 Money Firewall Customer Service Disaster Recovery Productivity Save Money Office Password Mouse Virtual Reality Data Security Wireless Technology Recovery Virtual Private Network SaaS Network Managed IT Services Unified Threat Management Hosted Solution IT Management Telephone Systems Monitors YouTube Maintenance communications Automation Data Backup Augmented Reality Printing Safety Communication Computing Mobile Device The Internet of Things Google Drive HIPAA Business Technology LiFi Infrastructure Mobile Security IBM Analytics Wireless Holiday Bandwidth Apps Customer Relationship Management Outlook Wi-Fi Hacking Scam Search Tablet End of Support Vulnerability Passwords Administration Presentation Hacker Avoiding Downtime VoIP FCC Buisness VPN Hard Disk Drive Websites Marketing IT solutions Alerts Firefox Servers IP Address BDR telephony Best Practice Computers Comparison Title II Techology Cortana Licensing Website Server Management Mobile Office Google Maps Storage Business Growth Display Specifications Online Downtime Mail Merge Hard Drives Current Events Legal Unified Threat Management Cooperation Statistics Mobile Device Management Dark Data Alt Codes Black Friday Cybercrime Microsoft Excel Address Digital Payment Refrigeration Going Green Public Speaking User Error Knowledge Staff Quick Tips Bluetooth Lithium-ion battery BYOD Typing Cyber Monday Blockchain Corporate Profile Operating System Unified Communications Printer Experience Wearable Technology VoIP Computer Care Cryptocurrency Smart Technology Running Cable Vendor Management Permissions Virtual Desktop Fun WannaCry Undo Access Control Time Management Laptop Cabling Training Application Bitcoin Gadgets Writing Distributed Denial of Service Information Technology Fraud Data loss Virtualization Automobile Paperless Office Google Docs SharePoint Applications Network Management Halloween Managed IT Windows 8 Users Retail Managed IT Service Google Wallet Lenovo Digital Downloads IT Technicians Touchscreen Scary Stories Shortcut Disaster Social Engineering Break Fix Drones Superfish Hotspot Spyware User Multi-Factor Security Dark Web Sports Patch Management Uninterrupted Power Supply Politics Social Collaboration Education Language Competition Humor Deep Learning Google Calendar How To Net Neutrality 5G Solid State Drive Document Management Tech Support Hacks File Sharing Budget Networking Computing Infrastructure How To Heating/Cooling IT service sip Samsung Bring Your Own Device Network Congestion Legislation Identity Theft Travel G Suite Notifications Upgrades Supercomputer Botnet Mobile Computing Motion Sickness Taxes Crowdsourcing 3D Printing IT Budget Machine Learning Domains Update IT Consultant Unsupported Software Relocation Meetings Chromebook Cleaning Mobile Data Private Cloud Webcam Emoji Work/Life Balance Emergency Error Point of Sale Black Market Law Enforcement Physical Security Twitter Staffing Gadget Personal Information Administrator Web Server Remote Computing GPS Computer Repair Cameras Processors Mirgation Tracking Health CrashOverride CCTV Alert Electronic Medical Records