Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Keep IT and the Rest of Your Staff on the Same Side

How to Keep IT and the Rest of Your Staff on the Same Side

There are some facets to IT that are universally accepted as important, such as security. However, there are also others that create some conflicting opinions between management and IT personnel. When surveyed, business leaders and IT management held vastly different opinions as to the importance of various IT tasks. Is there a way to unify these priorities?

Different Viewpoints and Priorities
According to the 2018 SIM (Society for Information Management) IT Trends Study, management and IT have very different views on how important many tasks are. The 1,200 respondents to the survey indicated that while business owners and management saw alignment between the business and IT as the second-highest priority, IT saw that as their fourth priority. Talent retention was another point where business leadership and IT didn’t quite see eye-to-eye. IT teams ranked that as worry number three, while business leaders ranked it as 17th. Business continuity saw a similar discrepancy, IT leaders ranking it at number eight, while business leaders ranked it 18th.

This isn’t a situation that benefits any business. Instead, the focus should be to align the priorities of IT and the rest of the business in order to achieve a greater, common goal.

Blending Two Priorities into a Common Goal
An effective means of getting the different facets of your team on the same page is to show them that they are all contributing to the success of the same business initiative. For instance, finances are a major concern of any business’ management. An IT team can much more easily communicate with the business side of things by speaking their language, so to speak.

Any IT team understands the importance of staying up-to-date where their solutions are concerned, but staying up-to-date will require an investment that management may resist signing off on. However, if the IT team can demonstrate how the investment into upgrades will allow the business to save money down the line, it provides the business half with the motivation to move forward. The same effect can often be accomplished with a frank, honest evaluation of the business’ future if certain investments aren’t made.

Win-Win or Lose-Lose
It is also important to cultivate the idea amongst your organization that the business half and the IT half should not be considered competitors. The two need to be partners, working together to make the best whole possible.

If there is ever a dispute or disagreement between the two halves of your business, resist the urge to find a compromise. Disagreement can be a good thing, as it provides the opportunity to examine a situation and define the best possible course of action for the business as a whole. This opens the door for more effective collaboration.
Compromise and collaboration are two very different things. While compromise suggests that both sides have to sacrifice something for any agreement to take shape, collaboration implies that both sides are unifying and putting forth their best effort to achieve a common goal--in this case, the betterment of the organization.

How have you found success in encouraging collaboration between your IT teams and the rest of your staff? Tell us in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Email Privacy Malware Hackers Business Computing Software Internet Microsoft Hosted Solutions Ransomware Android IT Services Business Network Security Google Computer Smartphone Windows Innovation Backup Mobile Devices Small Business Windows 10 Browser Internet of Things App Hardware Encryption Data Management Data Business Continuity Smartphones Cloud Computing Efficiency Data Recovery Saving Money Artificial Intelligence IT Support Outsourced IT Productivity Tip of the week Phishing Remote Monitoring Office 365 Managed IT Services Gmail User Tips Word Big Data Productivity Antivirus Facebook Cybersecurity Managed Service Provider IT Support Risk Management Windows 10 Robot Google Drive Chrome Settings Server Upgrade Vulnerability Business Management Data storage Office Tips Money Outlook Monitors Passwords Save Money Automation LiFi Employer-Employee Relationship Mouse Data Backup Virtual Reality HIPAA Miscellaneous Administration Communication Content Filtering Mobile Security Apple Government SaaS Analytics Unified Threat Management Business Technology Infrastructure Managed IT Services Maintenance Network Computing Two-factor Authentication Scam End of Support Hosted Solution Mobile Device Bandwidth Workplace Tips YouTube IT Management Data Security Server Management Social Media Holiday communications Microsoft Office Virtual Private Network Telephone Systems Alert Firewall Disaster Recovery The Internet of Things VoIP Samsung Augmented Reality Unified Threat Management Alt Codes Comparison Spyware Bluetooth Document Management Tech Support Permissions Budget Address VoIP File Sharing Typing Cybercrime Avoiding Downtime Wearable Technology Humor WiFi User Error Solid State Drive Specifications Current Events Marketing Websites Fraud Hard Disk Drive Cryptocurrency Time Management Printer Black Friday Going Green Search Emergency Cabling Bitcoin Network Management Applications Storage IT solutions Access Control Writing Cyber Monday How To Printing Hotspot Legal Windows 8 Running Cable Touchscreen BYOD IT Technicians Dark Data SharePoint Retail Smart Technology Firefox Buisness Managed IT Digital Payment Language Virtual Desktop Lenovo Disaster Laptop Mirgation Customer Service Downloads Office Deep Learning Distributed Denial of Service Shortcut Vendor Management Computing Infrastructure Operating System Superfish Uninterrupted Power Supply IBM Social Computer Care Spam Social Engineering Bring Your Own Device Managed IT Service Information Technology Downtime Patch Management Wireless Alerts Best Practice Customer Relationship Management Multi-Factor Security Corporate Profile Heating/Cooling Training Gadgets Safety Break Fix Automobile Paperless Office Licensing Google Docs Networking Dell Google Calendar WannaCry Hacks Halloween Servers Users Network Congestion Apps Dark Web Google Wallet VPN Google Maps Wi-Fi Cooperation Education Business Growth Legislation Data loss Password Scary Stories Computers Microsoft Excel Drones Website Quick Tips Staff Techology desktop Hacker Unified Communications Tablet Digital Sports Statistics Politics Display Blockchain Mail Merge Collaboration CCTV Health Mobile Computing Black Market Notifications Electronic Medical Records Identity Theft Twitter Upgrades Travel G Suite Crowdsourcing CrashOverride Supercomputer Botnet Remote Computing Motion Sickness 3D Printing Taxes IT Budget Machine Learning Unsupported Software IT Consultant Update Relocation Meetings Mobile Data Cleaning Work/Life Balance Recovery Private Cloud Webcam Law Enforcement Chromebook Error Point of Sale Physical Security Ben McDonald shares Gadget Emoji Personal Information Staffing Cortana Administrator Web Server Processors what was your? GPS Virtualization Cameras Computer Repair Mobile Device Management Tracking How To

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3