<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Service Managment (ITSM) Consultants - CIATEC</title>
	<atom:link href="https://www.ciatec.com/category/itsm/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ciatec.com/category/itsm/</link>
	<description>Information Security &#124; Information Technology &#124; Information Assurance &#124; Digital Strategy</description>
	<lastBuildDate>Mon, 08 Apr 2019 16:39:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8</generator>

<image>
	<url>https://www.ciatec.com/wp-content/uploads/2018/02/cropped-Ciatec-Icon-32x32.png</url>
	<title>IT Service Managment (ITSM) Consultants - CIATEC</title>
	<link>https://www.ciatec.com/category/itsm/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CIATEC signs partnership agreement with PECB</title>
		<link>https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 06 Apr 2019 13:23:29 +0000</pubDate>
				<category><![CDATA[CIATEC News]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Service Management]]></category>
		<category><![CDATA[ISO Audit]]></category>
		<category><![CDATA[ISO Training]]></category>
		<category><![CDATA[Partners]]></category>
		<category><![CDATA[PECB]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6089</guid>

					<description><![CDATA[<p>CIATEC is thrilled to announce its newly signed partnership agreement with PECB, the well-known ISO certification and training provider. By signing this agreement, CIATEC is now officially authorized to organize PECB official training courses and undergo official audits, in the middle east and Africa, for various ISO standards including but not limited to: Information Security &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/">CIATEC signs partnership agreement with PECB</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="/" target="_blank" rel="noopener noreferrer"><strong>CIATEC</strong> </a>is thrilled to announce its newly signed partnership agreement with <strong>PECB</strong>, the well-known ISO certification and training provider. By signing this agreement, <strong>CIATEC</strong> is now officially authorized to organize PECB official training courses and undergo official audits, in the middle east and Africa, for various ISO standards including but not limited to:</p>
<ul>
<li><strong>Information Security Management</strong>: ISO/IEC 27001 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">Information Security</a>.</li>
<li><strong>IT Security</strong>: ISO/IEC 27032 Cyber Security and ISO/IEC 27035 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">Incident Management</a>.</li>
<li><strong>Continuity and Resilience</strong>: ISO 22301 Business Continuity Management System.</li>
<li><strong>Service Management</strong>: ISO/IEC 20000 <a href="/services/information-security-consulting/" target="_blank" rel="noopener noreferrer">IT Service Management</a> and ISO/IEC 55001 Asset Management.</li>
<li><strong>Quality Management Systems</strong> (example: ISO 9001 Quality Management Systems, ISO 13053 Six Sigma, ISO 21500 Project Management).</li>
<li><strong>Health, Safety and Environment</strong> (example: ISO 14001 Environmental Management, ISO 22000 Food Safety Management, ISO 45001 Occupational Health and Safety Management).</li>
</ul>
<blockquote class="alignleft "><p>together we can build a strong and value-based society <cite>Eric Lachapelle, CEO of PECB</cite></p></blockquote>
<p>PECB issued an official press release announcing this partnership, where Mr. Eric Lachapelle, CEO of PECB, expressed PECB&#8217;s determination to make a renewed and positive contribution towards building a strong value-based society (<em><strong>Read full press release</strong> <strong><a href="https://pecb.com/en/newsDetail?nid=1027&amp;lid=1" target="_blank" rel="noopener noreferrer">here</a></strong></em>).</p>
<p>&nbsp;</p>
<p>At CIATEC, we truly believe that adopting and adapting internationally recognized standards and frameworks can transform organizations and lift them up to a whole new level. And this partnership with PECB will definitely contribute to CIATEC&#8217;s mission to provide our clients with the highest quality of management systems implementation, consulting and training services. We look forward to a successful long-term partnership with PECB.</p>
<h4 class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fw&quot;:&quot;bold&quot;,&quot;size&quot;:10}" data-doc-id="4397000283481219"><span style="color: #31aaa2;">About PECB </span></h4>
<p>PECB is a certification body for persons, management systems, and products on a wide range of international standards. As a global provider of training, examination, audit, and certification services, PECB offers its expertise on multiple fields, including but not limited to Information Security, IT, Business Continuity, Service Management, Quality Management Systems, Risk &amp; Management, Health, Safety, and Environment. For more detailed information regarding PECB principal objectives and activities, visit <a href="https://www.pecb.com" target="_blank" rel="noopener noreferrer">www.pecb.com</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/04/ciatec-signs-partnership-agreement-with-pecb/">CIATEC signs partnership agreement with PECB</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dubai: Using AI to Measure People&#8217;s Happiness</title>
		<link>https://www.ciatec.com/2019/03/dubai-using-ai-to-measure-peoples-happiness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 13 Mar 2019 11:01:38 +0000</pubDate>
				<category><![CDATA[Service Management]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Customer Experience]]></category>
		<category><![CDATA[CX]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[UAE]]></category>
		<category><![CDATA[UX]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=5888</guid>

					<description><![CDATA[<p>Dubai is not settling for smiley faces buttons to measure customers satisfaction. Dubai&#8217;s Roads and Transport Authority (RTA), has announced on Monday the use of highly accurate smart cameras powered by artificial intelligence (AI) technology in four &#8220;Customer Happiness Centers&#8221; in Dubai. Not a surprising name or call from a state that has a minister &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/03/dubai-using-ai-to-measure-peoples-happiness/">Dubai: Using AI to Measure People&#8217;s Happiness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Dubai is not settling for smiley faces buttons to measure customers satisfaction. <a href="https://www.rta.ae" target="_blank" rel="noopener noreferrer">Dubai&#8217;s Roads and Transport Authority (RTA)</a>, has announced on Monday the use of highly accurate smart cameras powered by artificial intelligence (AI) technology in four &#8220;Customer Happiness Centers&#8221; in Dubai. Not a surprising name or call from a state that has a <a href="https://www.happy.ae/en" target="_blank" rel="noopener noreferrer">minister of state for happiness</a>!</p>
<p>&#8220;The initiative aims to measure customers happiness index through smart cameras that analyze the extent of their happiness,&#8221; <em>Maher Shirah</em>, director of Smart Services at RTA&#8217;s Corporate Technology Support Services Sector. The system was able to produce detailed reports of a customer&#8217;s happiness levels, with instant alerts triggered when a center&#8217;s &#8220;happiness rating&#8221; drops below a predefined level. When this happens, actions can be taken to &#8220;restore customers&#8217; happiness level.&#8221;</p>
<p>As far as privacy is concerned, authorities indicated that the system analyses facial expressions and convert it into numeral value but doesn&#8217;t save the visual information.</p>
<p>This is one of the many uses AI can serve in service management measurement and metrics. And it will definitely contribute to raising the level of users satisfaction, the ultimate goal of successful <a href="/services/itsm/" target="_blank" rel="noopener noreferrer">service management system</a>.</p>
<p>The post <a href="https://www.ciatec.com/2019/03/dubai-using-ai-to-measure-peoples-happiness/">Dubai: Using AI to Measure People&#8217;s Happiness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>6 Steps to Build an Effective ITSM Strategy</title>
		<link>https://www.ciatec.com/2018/06/effective-itsm-strategy/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 06 Jun 2018 08:01:01 +0000</pubDate>
				<category><![CDATA[Service Management]]></category>
		<category><![CDATA[ITSM]]></category>
		<category><![CDATA[Strategy]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=2913</guid>

					<description><![CDATA[<p>Steps to Build an Effective ITSM Strategy To have a comprehensive and implemented IT service management ITSM strategy comes from the efficient workings of an IT service desk  that is developed by the support team to provide intelligent, multi-layered proficiency. The ITSM strategy provides the support team with a tool that not only supports the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/06/effective-itsm-strategy/">6 Steps to Build an Effective ITSM Strategy</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #000000;">Steps to Build an Effective ITSM Strategy </span></h2>
<p>To have a comprehensive and implemented IT service management ITSM strategy comes from the efficient workings of an <a href="/service-desk-in-itil-service-operation/" target="_blank" rel="noopener">IT service desk</a>  that is developed by the support team to provide intelligent, multi-layered proficiency. The ITSM strategy provides the support team with a tool that not only supports the organization, but also empowers it. The question here is how does an organization evolve from having a <strong>proficient service desk</strong> to having a <strong>culture of support</strong> that promotes originality, invention and the creation of value?</p>
<h2><span style="color: #008080;"><strong>1- Adopt Proven ITSM Standards<br />
</strong></span></h2>
<p>It might be assumed that established in-house processes are good enough for purpose, however, although it is necessary to continuously review and update systems, it is recommended that a reputable, proven guideline is used to update procedures. To do this, the adoption of a standard, for example, the <strong>information technology infrastructure library (<a href="https://www.axelos.com/best-practice-solutions/itil" target="_blank" rel="noopener">ITIL</a><sup>®</sup>)</strong>, is advised. These standards offer a base or a guideline for the company to build upon. So, to begin, chose a reputable, verified base and work from there.</p>
<h2><strong><span style="color: #008080;">2- Generate a Service Catalog as part of ITSM strategy</span><br />
</strong></h2>
<p><strong>A service catalog is one of the core elements of a successful ITSM strategy</strong> and provides a guideline to the IT services so that they can design the technology and procedures needed to carry them out. This also allows the IT services to become aligned with the company’s business strategies that they support. It also enables the IT services to demonstrate its effectiveness and importance within the company and the value it contributes company-wide.</p>
<h2><strong><span style="color: #008080;">3- Create CMDB</span><br />
</strong></h2>
<p>One of the core components of an ITSM strategy is a Configuration Management Database (CMDB). Some guidelines for building this are as follows:</p>
<ul>
<li><strong>Distinguish the main stakeholders</strong> and provide them with the relevant information for the process. Ensure that stakeholders ‘buy-in’ is guaranteed as complete backing is needed in case the establishment of governance is necessary.</li>
<li>Creating a CMDB is not a single step immediate process. Instead it can only be done in phases. The first is to record <strong>Configuration Items</strong> (CIs) that are able to illustrate the value of CMDB. This give the stakeholders something tangible to scrutinize and provide them information, so they can decide to buy-in. The proper level of governance is vital.</li>
<li>Criteria for identifying assets needs to be established and precise information needs to be kept in the database.<strong> Information needs to be continuously updated and needs to consist of accurate data</strong>. A clear compression of combining, integrating and transferring data in the database is also necessary.</li>
</ul>
<h2><span style="color: #008080;">4- ITSM Strategy: Be Methodical</span></h2>
<p>In fact, a better IT service management strategy is to <strong>roll things out step by step</strong> by giving your organization time to adjust to new processes and standards at each stage. You don’t have to implement a comprehensive strategy all at once.</p>
<h2><span style="color: #008080;"><strong>5- Implement Continual Improvement (CSI)</strong></span></h2>
<p>Matrices should be developed to measure both the successes and the failures of each process. The realizations and malfunctions of each stage needs to be logged in a template or spreadsheet. Once the boundaries are decided all of the information can be input into the template and used to monitor progress, identify errors or issues, and improve the system.</p>
<h2><span style="color: #008080;"><strong>6- ITSM Strategy: Assemble a Winning</strong><strong> </strong><strong>Team</strong></span></h2>
<p>The success of a company depends on the quality and efforts of its workforce who have both direct and indirect input to the successful provision of a product or service.  <strong>Quality staff in the right roles is vital to the success of any organization</strong>.<br />
The company needs to ensure that it has the best people for the job and that they are engaged, committed and comfortable with the company’s business culture. They need to have well-defined roles and responsibilities and they need to know what they should be doing. This is relevant for all levels of staff and participants from the support team right up to management level and any other shareholders.</p>
<h2><span style="color: #008080;">Final Thoughts</span></h2>
<p>IT success is not an accident. It is a continuous, purposeful delivery of IT services. This is not an instant success, but rather a process of continuous monitoring and improvement. A carefully planned and implemented framework, for example, ITIL as an ITSM can prepare a business for current and prospective development and profit increases.</p>
<hr />
<p><strong><em><a href="/" target="_blank" rel="noopener">Ciatec</a>, is an ITSM consulting firm with expertise that can definitely add to your ITSM strategy, <a href="/contact" target="_blank" rel="noopener">contact us</a> today for a free consultation.</em></strong></p>
<p>The post <a href="https://www.ciatec.com/2018/06/effective-itsm-strategy/">6 Steps to Build an Effective ITSM Strategy</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Key Steps for a Successful Change Management in SMBs</title>
		<link>https://www.ciatec.com/2018/05/5-key-steps-successful-change-management/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 01 May 2018 08:30:12 +0000</pubDate>
				<category><![CDATA[Service Management]]></category>
		<category><![CDATA[Change Management]]></category>
		<category><![CDATA[IT Operations]]></category>
		<category><![CDATA[ITIL]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1793</guid>

					<description><![CDATA[<p>5 Key Steps for a Successful Change Management A change, any change, can be very stressful, and changes in IT environment are no different. Statistics shows that more than half of the incidents in a given IT environment are caused by changes done by IT staff. A change, if not well planned and executed it &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/05/5-key-steps-successful-change-management/">5 Key Steps for a Successful Change Management in SMBs</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 dir="ltr">5 Key Steps for a Successful Change Management</h2>
<p>A change, any change, can be very stressful, and changes in IT environment are no different. Statistics shows that more than half of the incidents in a given IT environment are caused by <strong>changes </strong>done by IT staff. A change, if not well planned and executed it can be catastrophic. Fortunately, there are many standards and frameworks out there that can be of great assistance in implementing a <strong>successful change management</strong> module in your environment.</p>
<p>In ITIL change control process, change management requires CAB (Change Advisory Board) to review change, plan and assist in assessment and prioritization of changes. CAB is typically formed of IT and business representatives working together to support change management team. However, in small environments, change implementer, change planner, change manager, and even CAB are often being carried by one or two people switching hats based on the role they are playing at a particular time. But this doesn&#8217;t mean that proper change management process can&#8217;t be implemented in SMB, it can and it should. Furthermore, it is almost as important as implementing it in a large and well established organization.</p>
<p>At <a href="http://ciatec.com" target="_blank" rel="noopener"><em><strong>CIATEC</strong></em></a>, we are always looking to help make things better within IT departments. In this article we will specify the most important steps to implement a successful change management process.</p>
<p><img decoding="async" class="alignnone size-full wp-image-2728" src="https://www.ciatec.com/wp-content/uploads/2018/03/ChangeManagement-CIATEC.png" alt="" width="1701" height="1287" srcset="https://www.ciatec.com/wp-content/uploads/2018/03/ChangeManagement-CIATEC.png 1701w, https://www.ciatec.com/wp-content/uploads/2018/03/ChangeManagement-CIATEC-300x227.png 300w, https://www.ciatec.com/wp-content/uploads/2018/03/ChangeManagement-CIATEC-768x581.png 768w, https://www.ciatec.com/wp-content/uploads/2018/03/ChangeManagement-CIATEC-1024x775.png 1024w" sizes="(max-width: 1701px) 100vw, 1701px" /></p>
<h2 dir="ltr" style="text-align: left;">Change Management Key #1: <span style="text-decoration: underline; color: #008080;">Plan Change</span></h2>
<p>This is the &#8220;blue print&#8221; of the change to be implemented. At this level you should ask yourself questions such as:</p>

		<div class="lightbulb tie-list-shortcode">
<ul>
<li><strong>What</strong> is the value that this change will provide?</li>
<li><strong>Do we got</strong> all the needed resources to implement the change?</li>
<li><strong>Where</strong> is this change taking us?</li>
<li><strong>How</strong> to get there?</li>
<li><strong>What</strong> is the rollback plan to be used in case of change failure?</li>
</ul>

		</div>
	
<p>Answer the <em>what</em>, <em>where</em> and <em>how</em> questions and then answer the &#8220;<span style="text-decoration: underline;"><strong>When</strong></span>&#8221; question: Set the implementation schedule, choose a proper timing and make sure it doesn&#8217;t conflict with any other scheduled jobs that might be running at the same time.</p>
<h2 dir="ltr">Change Management Key #2: <span style="text-decoration: underline; color: #008080;">Classify &amp; Record Change</span></h2>
<p>Keeping record of changes is a very important factor in a successful change management approach. The first question that comes to mind after any incident is: &#8220;What was changed?&#8221;. If a change log exists, it would be easy to identify the change that might have caused the issue. Keeping record starts by filling in a <a data-toggle="tooltip" data-placement="top" class="post-tooltip tooltip-top" title="Contact us to get a free Request for Change template.">Request for Change (RFC)</a> with all the change details listed below:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Change type (<strong>Normal</strong>, <strong>Standard</strong> or <strong>Emergency</strong> are the 3 Change types according to ITIL v3)</li>
<li>Change scope and detailed steps to be done</li>
<li>Change Location (<em>For environments with multiple locations</em>)</li>
<li>Rollback plan</li>
<li>Severity (Critical, Important, Moderate)</li>
<li>Affected components and Change Impact</li>
<li>Schedule</li>
</ul>

		</div>
	
<h2 dir="ltr">Change Management Key #3: <span style="text-decoration: underline; color: #008080;">Communicate</span></h2>
<p>At this level you should make sure that all stakeholders are notified. Especially if the change might cause a service down time.</p>
<p>First notify the change &#8220;approver&#8221; (usually change manager or IT manager) and get the change approved and authorized. It is worth noting that change manager usually approves minor and low-risk changes without the need of CAB. CAB is consulted for major and significant changes of high risk.</p>
<p>When all is set, it is important that all potentially affected users are notified, make sure they know the impact and don&#8217;t forget to mention a time frame.</p>
<h2 dir="ltr">Change Management Key #4: <span style="text-decoration: underline; color: #008080;">Implement Change</span></h2>
<p>When all is set, and the change is approved, you can proceed with the implementation. This is the most critical part of the whole process, where the implementer puts the change management plan into action. It is crucial to keep documenting steps along the way especially if the change is being implemented in phases. Even if a rollback plan is in place, in some circumstances, change implementer might deviate from the original plan in a way that the rollback plan may not apply.</p>
<h2 dir="ltr">Change Management Key #5: <span style="text-decoration: underline; color: #008080;">Review Change</span></h2>
<p>This is also another very important phase, it is to asses the change and check if it provided the value as planned. After all changes are done to provide better value to business!</p>
<p>Check, review and asses the change, make a complete health-check to make sure that there were no side effects.</p>
<p>&nbsp;</p>
<p><em><strong>Those were five key steps to execute a successful change management plan in SMB IT environment, but it actually applies for any change, not just within IT. If you have any thing to add, please do share in the comments below, or contact us <a href="/contact" target="_blank" rel="noopener">here</a>.<br />
</strong></em></p>
<p>The post <a href="https://www.ciatec.com/2018/05/5-key-steps-successful-change-management/">5 Key Steps for a Successful Change Management in SMBs</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>You can&#8217;t become ISO Certified</title>
		<link>https://www.ciatec.com/2018/03/become-iso-certified/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 31 Mar 2018 08:30:46 +0000</pubDate>
				<category><![CDATA[Digital Strategy]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Service Management]]></category>
		<category><![CDATA[ISO]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=2166</guid>

					<description><![CDATA[<p>You want to become ISO Certified? If you want your company to become ISO certified, you probably already know the benefits. Other than operating under the governance of international standards, putting ISO Certification badge on your company website and paper publications is prestigious and will definitely contribute to a positive image towards your clients as &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/03/become-iso-certified/">You can&#8217;t become ISO Certified</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>You want to become ISO Certified?</h2>
<p>If you want your company to <strong>become ISO certified</strong>, you probably already know the benefits. Other than operating under the governance of international standards, putting ISO Certification badge on your company website and paper publications is prestigious and will definitely contribute to a positive image towards your clients as well as your own staff. However, it is very important to know <strong>how to promote your ISO certification</strong> without breaking the rules. In this article we&#8217;ll highlight the do&#8217;s and dont&#8217;s of promoting your ISO certification, but first let&#8217;s tell you a little bit about ISO.</p>
<h2>A little about ISO</h2>
<p>ISO (International Organization of Standards) is an international standard-setting organization located in Geneva, Switzerland with presence in 161 countries through National, Correspondent or Subscriber members. For example: US <a href="http://ansi.org" target="_blank" rel="noopener">ANSI</a>, Canada <a href="http://scc.ca" target="_blank" rel="noopener">SCC</a>, Saudi Arabia <a href="http://saso.gov.sa" target="_blank" rel="noopener">SASO</a>, Emirates <a href="http://esma.gov.ae" target="_blank" rel="noopener">ESMA</a>, Lebanon <a href="http://libnor.gov.lb" target="_blank" rel="noopener">LIBNOR</a> are all national standard bodies in the mentioned countries and members in ISO General Assembly that meet once a year to decide on strategic objectives.</p>
<p>ISO formed partnership with other International organizations: <strong>International Electrotechnical Commission (IEC)</strong> specialized in setting standards for Electrical and electronic-related technologies, and the <strong>International Telecommunication Union (ITU)</strong> specialized in setting standards for information and communication technologies. In 2001, ISO, IEC and ITU formed the <strong>World Standards Cooperation (WSC)</strong>.</p>
<p>One of the most popular standards is ISO 9001 Quality Management, but there are many others such as:</p>
<ul>
<li>ISO / IEC 27001 Information Security Management</li>
<li>ISO / IEC 20000 IT Service Management</li>
<li>ISO 14001 Environmental Management</li>
<li>ISO 22000 Food Safety Management</li>
</ul>
<p>and many others.</p>
<h2>Why it is wrong to say ISO Certified or ISO Certification?</h2>
<p>Your corporate can for example become <strong>ISO/IEC 27001:2013</strong> certified <span style="text-decoration: underline;">not</span> just <em><strong>ISO Certified</strong></em>, it can get <strong>ISO 20000-1:2011</strong> certification <span style="text-decoration: underline;">not</span> an <em><strong>ISO Certification</strong></em>. Meaning, that you&#8217;ll have to choose a domain that is relevant to your business, choose a <em>scope</em> within this domain, prepare the necessary documentation, implement the management system based on the standard, get audited and become certified in the chosen scope, and maintain your certification year after year.</p>
<p>ISO itself doesn&#8217;t provide certifications, certification bodies provide certifications. It is very important to choose your certification body, an ISO certification issued by a reputable and accredited certification body will reflect a better image to your business and inspire confidence. To name a few, here is a list of reputable certification bodies with global presence:</p>
<ul>
<li><a href="http://pecb.com" target="_blank" rel="noopener">PECB</a>, Canada</li>
<li><a href="http://bsigroup.com/en-GB/" target="_blank" rel="noopener">BSI</a>, UK</li>
<li><a href="http://tuv.com/world/en/" target="_blank" rel="noopener">TUV</a>, Germany</li>
<li><a href="http://bureauveritas.com" target="_blank" rel="noopener">Bureau Veritas</a>, France</li>
<li><a href="http://sgs.com" target="_blank" rel="noopener">SGS</a>, Switzerland</li>
</ul>
<h3>Do&#8217;s and Dont&#8217;s in promoting your ISO Certification</h3>

		<div class="thumbup tie-list-shortcode">
<ul>
<li>Use the full name of the standard <strong>ISO/IEC 27001:2013.</strong></li>
<li>Be specific on what areas of your business are covered in the awarded certification</li>
<li>Use the registrar certified mark.</li>
</ul>

		</div>
	

		<div class="thumbdown tie-list-shortcode">
<ul>
<li>Don&#8217;t use ISO logo on your products, ISO certification are awarded to a <em>management system</em> not a <em>product</em>.</li>
<li>Don&#8217;t use ISO name next to your product, company name, website name, social media accounts &#8230;etc.</li>
</ul>

		</div>
	
<p><img loading="lazy" decoding="async" class="alignnone wp-image-2187 size-medium" src="https://www.ciatec.com/wp-content/uploads/2018/03/Become-ISO-Certified-300x220.jpg" alt="Become ISO Certified" width="300" height="220" srcset="https://www.ciatec.com/wp-content/uploads/2018/03/Become-ISO-Certified-300x220.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/03/Become-ISO-Certified.jpg 450w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<h2>How can CIATEC help you Become ISO Certified</h2>
<p>CIATEC plays the role of remote consultant that can help prepare the necessary documentation to become ISO certified, currently focused on two main standards: <a data-toggle="tooltip" data-placement="top" class="post-tooltip tooltip-top" title="ISMS">ISO 27001</a> and <a data-toggle="tooltip" data-placement="top" class="post-tooltip tooltip-top" title="ITSM">ISO 20000</a> Certifications. ISO 27001 is a specification for an information security management system (ISMS), a framework of policies and procedures that includes all the needed controls involved in an organization&#8217;s information risk management processes. While ISO 20000 is a standard developed in 2005 and revised in 2011 it describes best practices to implement IT service management system. CIATEC catalyzes your process toward getting certified by helping you prepare the necessary documentation, implement the system and audit your work.</p>
<p><em><strong>Finally, if you need help implementing a management system and become ISO certified, <a href="http://twitter.com/AskCiatec" target="_blank" rel="noopener">@AskCiatec</a> or drop us a line <a href="/contact">here</a> for assistance.</strong></em></p>
<p>The post <a href="https://www.ciatec.com/2018/03/become-iso-certified/">You can&#8217;t become ISO Certified</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cloud Backup vs. Local Backup &#8211; What to Choose?</title>
		<link>https://www.ciatec.com/2018/03/cloud-backup-vs-local-backup/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 10 Mar 2018 13:06:23 +0000</pubDate>
				<category><![CDATA[Service Management]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Backup]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1543</guid>

					<description><![CDATA[<p>Backup is an essential task in the everyday life of any system administrator. And when it comes to deciding on the most suitable backup plan for your business, there are couple of decisions to be made. And you want to make sure you choose wisely, because a backup strategy is not something that can be &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/03/cloud-backup-vs-local-backup/">Cloud Backup vs. Local Backup &#8211; What to Choose?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span class="tie-dropcap ">B</span>ackup is an essential task in the everyday life of any system administrator. And when it comes to deciding on the most suitable backup plan for your business, there are couple of decisions to be made. And you want to make sure you choose wisely, because a backup strategy is not something that can be easily changed everyday.</p>
<p>In this post, we&#8217;ll try to help you choose between two major backup options <strong>Local backup and Cloud-based backup. </strong>But before jumping into the advantages and disadvantages of local backup and cloud backup, there are several variables to be considered before reaching a verdict:</p>
<p><strong>1- Data Size</strong>: This is the first thing to look at, how many GBs or TBs of data are to be backup on daily, weekly and monthly basis.</p>
<p><strong>2- Internet Speed</strong>: Before considering a cloud backup, internet capacity should be taken into consideration. Will it carry the load without affecting other services?</p>
<p><strong>3-</strong> <strong>Data Sensitivity</strong>: How sensitive is the data, and would the information asset owner (usually higher management) agree on copying this data into a third-party server?</p>
<p><strong>4-</strong> <strong>Budget</strong>: Cost is always a main player. How much is a company willing to pay to protect its data against accidental deletion, hacking, disasters&#8230;etc?</p>
<h1>Local Backup</h1>
<p><strong>Local backup</strong> is the traditional backup method that has been used for decades. Your data is usually protected by being copied to local storage on regular basis. A local storage can be hard drive, tape drive, flash drive and so on. As best practice, backup device should be placed in a different location than that of live data, and a copy of the backup data should be stored off-site on regular basis.</p>
<h2>Pros of Local Backup</h2>
<p><span style="font-size: 14pt; color: #339966;"><strong>+</strong></span> Full Control over your data: You know exactly where your data is, and you tell who will have access to what.</p>
<p><span style="font-size: 14pt; color: #339966;"><strong>+</strong></span> Independent from the internet speed: being copied locally, internet speed is irrelevant.</p>
<p><span style="font-size: 14pt; color: #339966;"><strong>+</strong></span> Backup and restore time is much faster.</p>
<p><strong><span style="font-size: 14pt; color: #339966;">+</span></strong> Offline copy of data is secure and protected against any malware attack on your network.</p>
<h2>Cons of Local Backup</h2>
<p><span style="font-size: 14pt; color: #ff0000;"><strong>&#8211;</strong></span> Reachability: You have no access to the backup data unless you are on the network.</p>
<p><span style="color: #ff0000; font-size: 14pt;"><strong>&#8211;</strong> </span>High Cost: Local backup will need a software license, backup hardware (such as tape library or network storage) and consumables (such as tapes of disks).</p>
<p><span style="font-size: 14pt; color: #ff0000;"><strong>&#8211;</strong></span> Maintenance: Being responsible of the whole software and hardware infrastructure mean that you&#8217;ll have to take care of all hardware and software errors and updates.</p>
<p><strong><span style="color: #ff0000; font-size: 14pt;">&#8211; </span></strong>Scalability: Expanding storage capacity comes at a relatively expensive cost compared to cloud backup.</p>
<hr />
<h1><span style="color: #3366ff;">Cloud-based Backup</span></h1>
<p><strong>Cloud-based backup</strong>, sometimes referred to as &#8220;online backup&#8221; or backup-as-a-service, is relatively &#8220;new&#8221; concept of backing up your data. Backup is being done over the internet to an off-site server usually hosted by third-party cloud service provider or on the companies private cloud if exists.</p>
<h2><span style="color: #3366ff;">Pros of Cloud Backup</span></h2>
<p><span style="font-size: 14pt; color: #008000;"><strong>+</strong></span> Reachability: Backup data could be accessed from any connected device.</p>
<p><span style="font-size: 14pt; color: #008000;"><strong>+</strong> </span>Cost: Pay as you go, purchase the size required for the time being and then expand as needed, this will save money, as the size of online storage is becoming cheaper year after year.</p>
<p><span style="font-size: 14pt; color: #008000;"><strong>+</strong> </span>Maintenance: Zero maintenance required from your side.</p>
<h2><span style="color: #3366ff;">Cons of Cloud Backup</span></h2>
<p><span style="font-size: 14pt; color: #ff0000;"><strong>&#8211;</strong> </span>Privacy: With data being stored on foreign server, your privacy is only protected by service agreement terms. That&#8217;s the main reason why companies are opting to build their own cloud.</p>
<p><span style="color: #ff0000;"><strong><span style="font-size: 14pt;">&#8211;</span> </strong></span>Requires high internet bandwidth especially if the size of data being backup is too high. If bandwidth upgrade is required, the price of this should be compared with the overall cost of local backup.</p>
<p><span style="color: #ff0000;"><strong><span style="font-size: 14pt;">&#8211;</span> </strong></span>Speed: Backup and restore time is much longer with cloud backup.</p>
<p><span style="font-size: 14pt; color: #ff0000;"><strong>&#8211;</strong> </span>Being accessible from any connected device, cloud backup will always be at risk of hacking and malware attacks.</p>
<hr />
<h2>Long story short: Summary of Cloud Backup vs. Local Backup</h2>
<table style="width: 503.45px;">
<tbody>
<tr>
<td style="width: 83px;"></td>
<td style="text-align: center; width: 166px;"><span style="font-size: 14pt;"><strong>Local Backup</strong> </span></td>
<td style="width: 245.45px; text-align: center;"><strong><span style="font-size: 14pt;">Cloud-Based Backup</span></strong></td>
</tr>
<tr>
<td style="width: 83px;"><span style="color: #008080;"><strong><span style="font-size: 14pt;">Cost</span></strong></span></td>
<td style="width: 166px; text-align: center;"><strong><span style="font-size: 14pt; color: #ff0000;">&#8212; </span></strong></td>
<td style="width: 245.45px; text-align: center;"><span style="font-size: 14pt;"><strong><span style="color: #339966;">++</span> </strong></span></td>
</tr>
<tr>
<td style="width: 83px;"><span style="color: #008080;"><strong><span style="font-size: 14pt;">Speed</span></strong></span></td>
<td style="width: 166px; text-align: center;"><span style="font-size: 14pt; color: #339966;"><strong> ++</strong></span></td>
<td style="width: 245.45px; text-align: center;"> <strong><span style="font-size: 14pt; color: #ff0000;">&#8212;</span></strong></td>
</tr>
<tr>
<td style="width: 83px;"><span style="color: #008080;"><strong><span style="font-size: 14pt;">Scalability</span></strong></span></td>
<td style="width: 166px; text-align: center;"><span style="color: #ff0000; font-size: 14pt;"><strong> &#8212;</strong></span></td>
<td style="width: 245.45px; text-align: center;"><span style="color: #339966;"><strong><span style="font-size: 14pt;">+++</span> </strong></span></td>
</tr>
<tr>
<td style="width: 83px;"><span style="color: #008080;"><strong><span style="font-size: 14pt;">Handling</span></strong></span></td>
<td style="width: 166px; text-align: center;"><span style="font-size: 14pt; color: #ff0000;"><strong> &#8212;</strong></span></td>
<td style="width: 245.45px; text-align: center;"><span style="color: #339966; font-size: 14pt;"><strong>+++</strong> </span></td>
</tr>
<tr>
<td style="width: 83px;"><span style="color: #008080;"><strong><span style="font-size: 14pt;">Security</span></strong></span></td>
<td style="width: 166px; text-align: center;"><span style="color: #339966;"><strong><span style="font-size: 14pt;">++</span> </strong></span></td>
<td style="width: 245.45px; text-align: center;"><strong><span style="color: #ff0000; font-size: 14pt;">&#8212; </span></strong></td>
</tr>
</tbody>
</table>
<p><em><strong>Those were the major differences between Local Backup and Cloud Backup. If you have second thoughts regarding your backup strategy, CIATEC staff can help! Just drop us a line in the comments or contact us <a href="/contact" target="_blank" rel="noopener">here</a> and we&#8217;ll be happy to assist.</strong></em></p>
<p>The post <a href="https://www.ciatec.com/2018/03/cloud-backup-vs-local-backup/">Cloud Backup vs. Local Backup &#8211; What to Choose?</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Reasons for SMBs to Invest in ITSM Today</title>
		<link>https://www.ciatec.com/2018/03/5-reasons-to-invest-in-itsm/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 07 Mar 2018 21:25:41 +0000</pubDate>
				<category><![CDATA[Service Management]]></category>
		<category><![CDATA[ITSM]]></category>
		<category><![CDATA[SMB]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1476</guid>

					<description><![CDATA[<p>Traditionally, company&#8217;s higher management perceives IT department as a burden that they can&#8217;t get rid off their shoulders. Any IT administrator, especially in the middle east, will absolutely agree with this. If an IT administrator tries to sell ITSM to higher management in a medium sized business will most probably face a series of well &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/03/5-reasons-to-invest-in-itsm/">5 Reasons for SMBs to Invest in ITSM Today</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Traditionally, company&#8217;s higher management perceives IT department as a burden that they can&#8217;t get rid off their shoulders. Any IT administrator, especially in the middle east, will absolutely agree with this. If an IT administrator tries to sell ITSM to higher management in a medium sized business will most probably face a series of well known arguments such as: <strong>ITIL is a huge framework to implement in small organization like ours</strong>, <strong>ITSM will cost more than it saves, our IT team is too small to implement ITSM? IT cost is already too high, </strong>and so on. All those arguments seems valid when you think short term. However, on the long run, particularly when you zoom out and look at the big picture, you will realize that IT operation will actually be providing value to business instead of being considered as load on company&#8217;s budget.</p>
<p>In fact, international frameworks such as ITIL or COBIT, as well as ISO (International Organization for Standardization), never relates the standard to organization size. Small and medium sized business can apply the standard or framework and get certified based on their own structure in the same manner as big and multinational enterprises. Organizations may also scope limited number of processes or sections of the standard that most applies to their business.</p>
<p><strong>Are you looking for a good reason to implement ITSM at your small or medium-sized organization?</strong> Here are five:</p>
<h2><span style="color: #008080;">1- With ITSM: Deliver more with Less</span></h2>
<p>Implementing the right ITSM system comes with a guarantee to raise productivity at less cost. Small and medium sized business with limited resources will be able to deliver more while saving on their running cost. Thus, increasing overall revenues.</p>
<h2><span style="color: #008080;">2- IT is the Heart and Soul of any Modern Company</span></h2>
<p>The vast majority of today&#8217;s companies, if not all companies, won&#8217;t be able to operate without information technology. It is no secret that any business nowadays relies on IT to survive and compete. A server room, data center or even cloud-based solution are now the heart and soul of business, regardless of its size. Investing in a proper ITSM will insure that IT services are operating in the best possible way, being delivered properly, available when needed, changed smoothly and continuously improving.</p>
<h2><span style="color: #008080;">3- Changes can be Catastrophic!</span></h2>
<p>Change is an essential part in the service life cycle, and if not well planned, it will cause harm more than good. Statistics show that more than 50% of IT incidents are caused by poorly executed changes. Change management in ITSM will ensure that changes are prioritized, properly scheduled, concerned parties notified and rollback plan is already prepared and ready to be executed in case of failure.</p>
<h2><span style="color: #008080;">4- IT Support Staff, not Fire Fighters</span></h2>
<p>We have discussed in <a href="/2018/02/17/the-function-that-matters-the-most-in-itil-service-operation/" target="_blank" rel="noopener">previous post</a> the importance of <a href="/tag/service-desk/" target="_blank" rel="noopener">service desk</a> to end users. Without applying ITSM best practice, support staff in SMB (already on limited resources) will run all day long in a rat race trying to resolve issues reported through phone calls or email messages in chaos without any prioritization, record, or reporting.</p>
<p>Service desk management tool will organize things for both IT staff and management by balancing urgency and priority, keeping record, reporting time needed to resolve issues and measuring its compliance with the service level agreement. When implemented, it will definitely increase productivity and contribute positively to continuous service improvement.</p>
<h2><span style="color: #008080;">5- Get Ready to Shine</span></h2>
<p>Building a business on solid foundations will make growth potential easier. Many growth opportunities are lost simply because the organization&#8217;s IT structure is not ready to handle big clients. Well implemented ITSM will make things move in the right direction and the organization will be well-structured and ready to handle larger number of clients with minimal adjustments.</p>
<p><em><strong>Those were five reasons for companies to start investing in ITSM today. If you have more reasons to urge executives to invest in ITSM, please share in the comments below.</strong></em></p>
<p>The post <a href="https://www.ciatec.com/2018/03/5-reasons-to-invest-in-itsm/">5 Reasons for SMBs to Invest in ITSM Today</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The function that matters the most in ITIL Service Operation</title>
		<link>https://www.ciatec.com/2018/02/service-desk-in-itil-service-operation/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 17 Feb 2018 09:23:58 +0000</pubDate>
				<category><![CDATA[Service Management]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[ITIL]]></category>
		<category><![CDATA[Service Desk]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1092</guid>

					<description><![CDATA[<p>Reading through the third version of Information Technology Infrastructure Library (ITIL V3) foundation course, there is a single phrase that I&#8217;ll never forget: &#8220;Service desk is the only function that is visible to users&#8220;. This is very true, in all the organization I worked with, across middle east and Africa, the vast majority of end &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/02/service-desk-in-itil-service-operation/">The function that matters the most in ITIL Service Operation</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Reading through the third version of <a href="https://www.axelos.com/best-practice-solutions/itil/what-is-itil" target="_blank" rel="noopener">Information Technology Infrastructure Library (ITIL V3)</a> foundation course, there is a single phrase that I&#8217;ll never forget: &#8220;<strong><em>Service desk is the only function that is visible to users</em></strong>&#8220;. This is very true, in all the organization I worked with, across middle east and Africa, the vast majority of end users refers to the whole information technology department as IT service desk, for them that&#8217;s what IT is all about.</p>
<blockquote><p>Service desk is the highest visible &#8220;face&#8221; of IT!<cite></cite></p></blockquote>
<h3>Service Desk in ITIL V3</h3>
<p>According to ITIL V3 model, service-desk is a function under service operations responsible for coordinating and conducting the processes and activities needed to manage services for business end users and customers based on the previously agreed service level agreement (SLA) terms. Service-desk serves as a single point of contact (SPOC) between organization users and IT management. Service-desk is the first to be contacted for any IT-related inquiry end users have, and that is what makes it a crucial factor in improving the whole corporate strategy.</p>
<h4>Service Desk Types</h4>
<p>Service-desk can be implemented in various types and forms based on business need. Below are the different types of service desk that could be implemented in your organization. Most organizations mix and match between different types of service desk to come up with a hybrid solution.</p>
<ul>
<li><strong>Local Service-Desk</strong>: This is the type of service-desk to be implemented in organizations that operates from a single site.</li>
<li><strong>Centralized Service-Desk</strong>: Operates from a single location to provide support to staff in multiple geographical locations. This is a cost effective way of implementing service-desk solution for organizations with multiple sites or branches.</li>
<li><strong>Virtual Service-Desk</strong>: Members of virtual service desk team may be located in more than one location, they utilize various online technologies to provide remote support to users in multiple sites. This is the favorite type that outsourcing service providers use, it allows them to use the same team for more than one customer.</li>
<li><strong>Follow-the-Sun Service-Desk</strong>: This is famous among multinational companies with global presence and requires 24/7 support. Implementing this type of service desk requires at least two service desk teams to be located in different time zones with at least 4 hours of time difference between them.</li>
</ul>
<h3>Benefits of Implementing Service Desk</h3>
<p>Now that we went through the importance of service desk in any organization, here are 4 benefits of implementing a service desk solution at your organization:</p>
<ol>
<li><strong>Single Point of Contact</strong>: Back-end engineers working on infrastructure level, or writing code for a certain application must operate in an environment that is isolated from end-users, they are not to be contacted directly. After implementing a service desk solution customers will have one-stop solution for all their inquires, requests, and complaints.</li>
<li><strong>Customer Satisfaction</strong>: Whether service-desk is providing support to customers or to business end-users in same organization, customer satisfaction is a key element for increasing productivity and business growth. A satisfied customer will generate more business.</li>
<li><strong>Monitoring, Tracking and Escalation</strong>: A well-implemented service-desk solution allows complete monitoring on problem resolution cycle from the moment of opening the case till closure. It allows tracking incidents to measure team efficiency and provides material to improve the service based on incidents history. It also implements issue escalation procedures to higher tier for better resolution timing especially for incidents with high severity.</li>
<li><strong>Improving Productivity</strong>: Minimizing down time and resolving issues in organized and timely manner will increase efficiency and higher productivity. Thus, providing more <em><strong>value</strong> </em>to business.</li>
</ol>
<p>&nbsp;</p>
<p><em><strong>Read more about IT service management <a href="/category/itsm/" target="_blank" rel="noopener">here</a>.</strong></em></p>
<p>&nbsp;</p>
<p>The post <a href="https://www.ciatec.com/2018/02/service-desk-in-itil-service-operation/">The function that matters the most in ITIL Service Operation</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meet CIATEC</title>
		<link>https://www.ciatec.com/2018/02/about-ciatec/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Wed, 14 Feb 2018 14:02:04 +0000</pubDate>
				<category><![CDATA[Digital Strategy]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Service Management]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.cia-tec.com/?p=1042</guid>

					<description><![CDATA[<p>First things first, CIATEC is not in any way related to or associated with the US Central Intelligence Agency, as the name might suggest, however our team share the intelligence part and planning to become an agency at some point in time. Why CIATEC? CIA TEC name was inspired by two main fields of interest, &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2018/02/about-ciatec/">Meet CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>First things first, CIATEC is not in any way related to or associated with the US Central Intelligence Agency, as the name might suggest, however our team share the intelligence part and planning to become an agency at some point in time.</p>
<h3>Why CIATEC?</h3>
<p>CIA TEC name was inspired by two main fields of interest, information security field represented by CIA triad (<strong>C</strong>onfidentially, <strong>I</strong>ntegrity and <strong>A</strong>vailability) and information technology being the wide umbrella covering several topics underneath it, with emphasis on IT Service Management (ITSM), IT Security and Digital Strategy.</p>
<h3>Work in Progress<img loading="lazy" decoding="async" class="size-thumbnail wp-image-1696 alignright" src="https://www.cia-tec.com/wp-content/uploads/2018/03/Citatec-Work-in-Progress-150x150.png" alt="" width="150" height="150" srcset="https://www.ciatec.com/wp-content/uploads/2018/03/Citatec-Work-in-Progress-150x150.png 150w, https://www.ciatec.com/wp-content/uploads/2018/03/Citatec-Work-in-Progress-300x300.png 300w, https://www.ciatec.com/wp-content/uploads/2018/03/Citatec-Work-in-Progress.png 512w" sizes="(max-width: 150px) 100vw, 150px" /></h3>
<p>CIATEC is still a new born that is being nourished by an ambitious small team of beautiful minds with solid background in digital and information technology, systems management, network management, information security, IT security and IT operations management.</p>
<p>We believe that there is always a room for improvement. We invite you to share with us any suggestions or comments about CIATEC <a href="/contact" target="_blank" rel="noopener">here</a> or through our social media channels:</p>
<a href="http://www.facebook.com/AskCiatec" target="_blank" class="shortc-button small blue "><span class="fab fa-facebook-f" aria-hidden="true"></span> Facebook</a> <a href="http://www.twitter.com/AskCiatec" target="_blank" class="shortc-button small blue "><span class="fab fa-twitter" aria-hidden="true"></span> Twitter</a>
<p>&nbsp;</p>
<p><span style="font-size: 22px; font-weight: bold;">Locations</span></p>
<p>While the vast majority of our posts, tips and advice applies on any country or environment, we are focused on the Middle East region particularly in Saudi Arabia, United Arab Emirates, and Lebanon.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1223" src="https://www.cia-tec.com/wp-content/uploads/2018/02/Ciatec-Map.gif" alt="CIATEC MAP" width="853" height="681" /></p>
<h2>Browse Topics</h2>
<h2>
		<div class="tags-shortcode"><a href="https://www.ciatec.com/tag/ai/" class="tag-cloud-link tag-link-226 tag-link-position-1" style="font-size: 8pt;" aria-label="AI (1 item)">AI</a>
<a href="https://www.ciatec.com/tag/apple-2/" class="tag-cloud-link tag-link-198 tag-link-position-2" style="font-size: 8pt;" aria-label="apple (1 item)">apple</a>
<a href="https://www.ciatec.com/tag/awareness/" class="tag-cloud-link tag-link-132 tag-link-position-3" style="font-size: 11.876923076923pt;" aria-label="Awareness (2 items)">Awareness</a>
<a href="https://www.ciatec.com/tag/backup/" class="tag-cloud-link tag-link-88 tag-link-position-4" style="font-size: 8pt;" aria-label="Backup (1 item)">Backup</a>
<a href="https://www.ciatec.com/tag/banking/" class="tag-cloud-link tag-link-123 tag-link-position-5" style="font-size: 8pt;" aria-label="Banking (1 item)">Banking</a>
<a href="https://www.ciatec.com/tag/banking-security/" class="tag-cloud-link tag-link-125 tag-link-position-6" style="font-size: 8pt;" aria-label="Banking Security (1 item)">Banking Security</a>
<a href="https://www.ciatec.com/tag/blockchain/" class="tag-cloud-link tag-link-42 tag-link-position-7" style="font-size: 8pt;" aria-label="Blockchain (1 item)">Blockchain</a>
<a href="https://www.ciatec.com/tag/careem/" class="tag-cloud-link tag-link-38 tag-link-position-8" style="font-size: 11.876923076923pt;" aria-label="Careem (2 items)">Careem</a>
<a href="https://www.ciatec.com/tag/change-management/" class="tag-cloud-link tag-link-101 tag-link-position-9" style="font-size: 8pt;" aria-label="Change Management (1 item)">Change Management</a>
<a href="https://www.ciatec.com/tag/customer-experience/" class="tag-cloud-link tag-link-227 tag-link-position-10" style="font-size: 8pt;" aria-label="Customer Experience (1 item)">Customer Experience</a>
<a href="https://www.ciatec.com/tag/cx/" class="tag-cloud-link tag-link-228 tag-link-position-11" style="font-size: 8pt;" aria-label="CX (1 item)">CX</a>
<a href="https://www.ciatec.com/tag/cyber-security-awareness/" class="tag-cloud-link tag-link-203 tag-link-position-12" style="font-size: 8pt;" aria-label="Cyber Security Awareness (1 item)">Cyber Security Awareness</a>
<a href="https://www.ciatec.com/tag/defence-in-depth/" class="tag-cloud-link tag-link-83 tag-link-position-13" style="font-size: 8pt;" aria-label="Defence in Depth (1 item)">Defence in Depth</a>
<a href="https://www.ciatec.com/tag/defense-in-depth/" class="tag-cloud-link tag-link-82 tag-link-position-14" style="font-size: 8pt;" aria-label="Defense in Depth (1 item)">Defense in Depth</a>
<a href="https://www.ciatec.com/tag/digital-marketing/" class="tag-cloud-link tag-link-26 tag-link-position-15" style="font-size: 8pt;" aria-label="Digital Marketing (1 item)">Digital Marketing</a>
<a href="https://www.ciatec.com/tag/disaster-recovery-plan/" class="tag-cloud-link tag-link-62 tag-link-position-16" style="font-size: 8pt;" aria-label="Disaster Recovery Plan (1 item)">Disaster Recovery Plan</a>
<a href="https://www.ciatec.com/tag/dr/" class="tag-cloud-link tag-link-63 tag-link-position-17" style="font-size: 8pt;" aria-label="DR (1 item)">DR</a>
<a href="https://www.ciatec.com/tag/dubai/" class="tag-cloud-link tag-link-225 tag-link-position-18" style="font-size: 11.876923076923pt;" aria-label="Dubai (2 items)">Dubai</a>
<a href="https://www.ciatec.com/tag/ecommerce/" class="tag-cloud-link tag-link-133 tag-link-position-19" style="font-size: 8pt;" aria-label="Ecommerce (1 item)">Ecommerce</a>
<a href="https://www.ciatec.com/tag/employees-security-assessment/" class="tag-cloud-link tag-link-265 tag-link-position-20" style="font-size: 8pt;" aria-label="Employees security assessment (1 item)">Employees security assessment</a>
<a href="https://www.ciatec.com/tag/facebook/" class="tag-cloud-link tag-link-122 tag-link-position-21" style="font-size: 8pt;" aria-label="Facebook (1 item)">Facebook</a>
<a href="https://www.ciatec.com/tag/finance/" class="tag-cloud-link tag-link-124 tag-link-position-22" style="font-size: 8pt;" aria-label="Finance (1 item)">Finance</a>
<a href="https://www.ciatec.com/tag/fraud-warning/" class="tag-cloud-link tag-link-271 tag-link-position-23" style="font-size: 8pt;" aria-label="Fraud Warning (1 item)">Fraud Warning</a>
<a href="https://www.ciatec.com/tag/gdpr/" class="tag-cloud-link tag-link-163 tag-link-position-24" style="font-size: 8pt;" aria-label="GDPR (1 item)">GDPR</a>
<a href="https://www.ciatec.com/tag/google/" class="tag-cloud-link tag-link-75 tag-link-position-25" style="font-size: 8pt;" aria-label="Google (1 item)">Google</a>
<a href="https://www.ciatec.com/tag/hard-disk/" class="tag-cloud-link tag-link-92 tag-link-position-26" style="font-size: 8pt;" aria-label="Hard Disk (1 item)">Hard Disk</a>
<a href="https://www.ciatec.com/tag/information-security-awareness/" class="tag-cloud-link tag-link-204 tag-link-position-27" style="font-size: 14.461538461538pt;" aria-label="Information Security Awareness (3 items)">Information Security Awareness</a>
<a href="https://www.ciatec.com/tag/information-security-in-banking/" class="tag-cloud-link tag-link-126 tag-link-position-28" style="font-size: 11.876923076923pt;" aria-label="Information Security in Banking (2 items)">Information Security in Banking</a>
<a href="https://www.ciatec.com/tag/information-security-management-system/" class="tag-cloud-link tag-link-153 tag-link-position-29" style="font-size: 8pt;" aria-label="Information Security Management System (1 item)">Information Security Management System</a>
<a href="https://www.ciatec.com/tag/inofmration-security-training-for-employees/" class="tag-cloud-link tag-link-266 tag-link-position-30" style="font-size: 8pt;" aria-label="Inofmration security training for employees (1 item)">Inofmration security training for employees</a>
<a href="https://www.ciatec.com/tag/internet/" class="tag-cloud-link tag-link-175 tag-link-position-31" style="font-size: 8pt;" aria-label="Internet (1 item)">Internet</a>
<a href="https://www.ciatec.com/tag/internet-history/" class="tag-cloud-link tag-link-195 tag-link-position-32" style="font-size: 8pt;" aria-label="Internet History (1 item)">Internet History</a>
<a href="https://www.ciatec.com/tag/internet-of-things/" class="tag-cloud-link tag-link-108 tag-link-position-33" style="font-size: 8pt;" aria-label="Internet of Things (1 item)">Internet of Things</a>
<a href="https://www.ciatec.com/tag/internet-usage/" class="tag-cloud-link tag-link-79 tag-link-position-34" style="font-size: 8pt;" aria-label="Internet Usage (1 item)">Internet Usage</a>
<a href="https://www.ciatec.com/tag/iot/" class="tag-cloud-link tag-link-109 tag-link-position-35" style="font-size: 8pt;" aria-label="IoT (1 item)">IoT</a>
<a href="https://www.ciatec.com/tag/isms/" class="tag-cloud-link tag-link-152 tag-link-position-36" style="font-size: 8pt;" aria-label="ISMS (1 item)">ISMS</a>
<a href="https://www.ciatec.com/tag/iso/" class="tag-cloud-link tag-link-117 tag-link-position-37" style="font-size: 11.876923076923pt;" aria-label="ISO (2 items)">ISO</a>
<a href="https://www.ciatec.com/tag/iso-27001/" class="tag-cloud-link tag-link-151 tag-link-position-38" style="font-size: 8pt;" aria-label="ISO 27001 (1 item)">ISO 27001</a>
<a href="https://www.ciatec.com/tag/iso-audit/" class="tag-cloud-link tag-link-239 tag-link-position-39" style="font-size: 8pt;" aria-label="ISO Audit (1 item)">ISO Audit</a>
<a href="https://www.ciatec.com/tag/iso-training/" class="tag-cloud-link tag-link-238 tag-link-position-40" style="font-size: 8pt;" aria-label="ISO Training (1 item)">ISO Training</a>
<a href="https://www.ciatec.com/tag/itil/" class="tag-cloud-link tag-link-29 tag-link-position-41" style="font-size: 11.876923076923pt;" aria-label="ITIL (2 items)">ITIL</a>
<a href="https://www.ciatec.com/tag/it-operations/" class="tag-cloud-link tag-link-107 tag-link-position-42" style="font-size: 8pt;" aria-label="IT Operations (1 item)">IT Operations</a>
<a href="https://www.ciatec.com/tag/itsm/" class="tag-cloud-link tag-link-85 tag-link-position-43" style="font-size: 11.876923076923pt;" aria-label="ITSM (2 items)">ITSM</a>
<a href="https://www.ciatec.com/tag/layered-security/" class="tag-cloud-link tag-link-84 tag-link-position-44" style="font-size: 8pt;" aria-label="layered security (1 item)">layered security</a>
<a href="https://www.ciatec.com/tag/lebanon/" class="tag-cloud-link tag-link-24 tag-link-position-45" style="font-size: 11.876923076923pt;" aria-label="Lebanon (2 items)">Lebanon</a>
<a href="https://www.ciatec.com/tag/lifi/" class="tag-cloud-link tag-link-74 tag-link-position-46" style="font-size: 8pt;" aria-label="LiFi (1 item)">LiFi</a>
<a href="https://www.ciatec.com/tag/middle-east/" class="tag-cloud-link tag-link-80 tag-link-position-47" style="font-size: 8pt;" aria-label="Middle East (1 item)">Middle East</a>
<a href="https://www.ciatec.com/tag/mobile-device-security/" class="tag-cloud-link tag-link-260 tag-link-position-48" style="font-size: 8pt;" aria-label="Mobile Device Security (1 item)">Mobile Device Security</a>
<a href="https://www.ciatec.com/tag/mobile-device-security-tips/" class="tag-cloud-link tag-link-261 tag-link-position-49" style="font-size: 8pt;" aria-label="Mobile Device Security Tips (1 item)">Mobile Device Security Tips</a>
<a href="https://www.ciatec.com/tag/mobile-security/" class="tag-cloud-link tag-link-262 tag-link-position-50" style="font-size: 8pt;" aria-label="Mobile Security (1 item)">Mobile Security</a>
<a href="https://www.ciatec.com/tag/online-business/" class="tag-cloud-link tag-link-102 tag-link-position-51" style="font-size: 8pt;" aria-label="online business (1 item)">online business</a>
<a href="https://www.ciatec.com/tag/partners/" class="tag-cloud-link tag-link-237 tag-link-position-52" style="font-size: 8pt;" aria-label="Partners (1 item)">Partners</a>
<a href="https://www.ciatec.com/tag/pecb/" class="tag-cloud-link tag-link-236 tag-link-position-53" style="font-size: 8pt;" aria-label="PECB (1 item)">PECB</a>
<a href="https://www.ciatec.com/tag/phishing/" class="tag-cloud-link tag-link-28 tag-link-position-54" style="font-size: 14.461538461538pt;" aria-label="Phishing (3 items)">Phishing</a>
<a href="https://www.ciatec.com/tag/phishing-awareness/" class="tag-cloud-link tag-link-206 tag-link-position-55" style="font-size: 11.876923076923pt;" aria-label="Phishing Awareness (2 items)">Phishing Awareness</a>
<a href="https://www.ciatec.com/tag/phishing-simulation/" class="tag-cloud-link tag-link-254 tag-link-position-56" style="font-size: 8pt;" aria-label="Phishing Simulation (1 item)">Phishing Simulation</a>
<a href="https://www.ciatec.com/tag/phishing-training/" class="tag-cloud-link tag-link-252 tag-link-position-57" style="font-size: 8pt;" aria-label="Phishing training (1 item)">Phishing training</a>
<a href="https://www.ciatec.com/tag/phishing-training-for-employees/" class="tag-cloud-link tag-link-253 tag-link-position-58" style="font-size: 8pt;" aria-label="Phishing training for employees (1 item)">Phishing training for employees</a>
<a href="https://www.ciatec.com/tag/phishmark/" class="tag-cloud-link tag-link-251 tag-link-position-59" style="font-size: 8pt;" aria-label="Phishmark (1 item)">Phishmark</a>
<a href="https://www.ciatec.com/tag/privacy/" class="tag-cloud-link tag-link-197 tag-link-position-60" style="font-size: 14.461538461538pt;" aria-label="Privacy (3 items)">Privacy</a>
<a href="https://www.ciatec.com/tag/quiz/" class="tag-cloud-link tag-link-263 tag-link-position-61" style="font-size: 8pt;" aria-label="Quiz (1 item)">Quiz</a>
<a href="https://www.ciatec.com/tag/saudi-arabia/" class="tag-cloud-link tag-link-37 tag-link-position-62" style="font-size: 11.876923076923pt;" aria-label="Saudi Arabia (2 items)">Saudi Arabia</a>
<a href="https://www.ciatec.com/tag/scam/" class="tag-cloud-link tag-link-131 tag-link-position-63" style="font-size: 8pt;" aria-label="Scam (1 item)">Scam</a>
<a href="https://www.ciatec.com/tag/search-engines/" class="tag-cloud-link tag-link-179 tag-link-position-64" style="font-size: 8pt;" aria-label="Search Engines (1 item)">Search Engines</a>
<a href="https://www.ciatec.com/tag/security-awareness/" class="tag-cloud-link tag-link-205 tag-link-position-65" style="font-size: 8pt;" aria-label="Security Awareness (1 item)">Security Awareness</a>
<a href="https://www.ciatec.com/tag/security-awareness-assessment/" class="tag-cloud-link tag-link-264 tag-link-position-66" style="font-size: 8pt;" aria-label="security awareness assessment (1 item)">security awareness assessment</a>
<a href="https://www.ciatec.com/tag/security-awareness-training/" class="tag-cloud-link tag-link-207 tag-link-position-67" style="font-size: 8pt;" aria-label="Security Awareness Training (1 item)">Security Awareness Training</a>
<a href="https://www.ciatec.com/tag/security-breach/" class="tag-cloud-link tag-link-155 tag-link-position-68" style="font-size: 8pt;" aria-label="Security Breach (1 item)">Security Breach</a>
<a href="https://www.ciatec.com/tag/sem/" class="tag-cloud-link tag-link-160 tag-link-position-69" style="font-size: 8pt;" aria-label="SEM (1 item)">SEM</a>
<a href="https://www.ciatec.com/tag/seo/" class="tag-cloud-link tag-link-159 tag-link-position-70" style="font-size: 11.876923076923pt;" aria-label="SEO (2 items)">SEO</a>
<a href="https://www.ciatec.com/tag/service-desk/" class="tag-cloud-link tag-link-30 tag-link-position-71" style="font-size: 8pt;" aria-label="Service Desk (1 item)">Service Desk</a>
<a href="https://www.ciatec.com/tag/smb/" class="tag-cloud-link tag-link-86 tag-link-position-72" style="font-size: 8pt;" aria-label="SMB (1 item)">SMB</a>
<a href="https://www.ciatec.com/tag/social-media/" class="tag-cloud-link tag-link-76 tag-link-position-73" style="font-size: 11.876923076923pt;" aria-label="Social Media (2 items)">Social Media</a>
<a href="https://www.ciatec.com/tag/ssl/" class="tag-cloud-link tag-link-276 tag-link-position-74" style="font-size: 8pt;" aria-label="SSL (1 item)">SSL</a>
<a href="https://www.ciatec.com/tag/ssl-certificate/" class="tag-cloud-link tag-link-277 tag-link-position-75" style="font-size: 8pt;" aria-label="SSL Certificate (1 item)">SSL Certificate</a>
<a href="https://www.ciatec.com/tag/statistics/" class="tag-cloud-link tag-link-78 tag-link-position-76" style="font-size: 18.338461538462pt;" aria-label="Statistics (5 items)">Statistics</a>
<a href="https://www.ciatec.com/tag/strategy/" class="tag-cloud-link tag-link-162 tag-link-position-77" style="font-size: 8pt;" aria-label="Strategy (1 item)">Strategy</a>
<a href="https://www.ciatec.com/tag/successful-online-business/" class="tag-cloud-link tag-link-103 tag-link-position-78" style="font-size: 8pt;" aria-label="Successful Online Business (1 item)">Successful Online Business</a>
<a href="https://www.ciatec.com/tag/tech-history/" class="tag-cloud-link tag-link-196 tag-link-position-79" style="font-size: 8pt;" aria-label="Tech History (1 item)">Tech History</a>
<a href="https://www.ciatec.com/tag/tech-news/" class="tag-cloud-link tag-link-111 tag-link-position-80" style="font-size: 22pt;" aria-label="Tech News (8 items)">Tech News</a>
<a href="https://www.ciatec.com/tag/trends/" class="tag-cloud-link tag-link-77 tag-link-position-81" style="font-size: 8pt;" aria-label="Trends (1 item)">Trends</a>
<a href="https://www.ciatec.com/tag/uae/" class="tag-cloud-link tag-link-230 tag-link-position-82" style="font-size: 11.876923076923pt;" aria-label="UAE (2 items)">UAE</a>
<a href="https://www.ciatec.com/tag/uber/" class="tag-cloud-link tag-link-110 tag-link-position-83" style="font-size: 8pt;" aria-label="Uber (1 item)">Uber</a>
<a href="https://www.ciatec.com/tag/ux/" class="tag-cloud-link tag-link-229 tag-link-position-84" style="font-size: 8pt;" aria-label="UX (1 item)">UX</a>
<a href="https://www.ciatec.com/tag/vdi/" class="tag-cloud-link tag-link-90 tag-link-position-85" style="font-size: 11.876923076923pt;" aria-label="VDI (2 items)">VDI</a>
<a href="https://www.ciatec.com/tag/virtual-desktop-infrastructure/" class="tag-cloud-link tag-link-89 tag-link-position-86" style="font-size: 8pt;" aria-label="Virtual Desktop Infrastructure (1 item)">Virtual Desktop Infrastructure</a>
<a href="https://www.ciatec.com/tag/wd-hard-disks-colors/" class="tag-cloud-link tag-link-106 tag-link-position-87" style="font-size: 8pt;" aria-label="WD Hard Disks Colors (1 item)">WD Hard Disks Colors</a>
<a href="https://www.ciatec.com/tag/website-security/" class="tag-cloud-link tag-link-278 tag-link-position-88" style="font-size: 8pt;" aria-label="Website Security (1 item)">Website Security</a>
<a href="https://www.ciatec.com/tag/wifi/" class="tag-cloud-link tag-link-73 tag-link-position-89" style="font-size: 8pt;" aria-label="WiFi (1 item)">WiFi</a>
		</div><!-- .tags-shortcode /-->
	</h2>
<p>The post <a href="https://www.ciatec.com/2018/02/about-ciatec/">Meet CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
