CEO Survival
CEO Survival
Information Technology
Bob Coppedge
Copyright © 2018
Published by: Simplex-IT Press
V
VI Bob Coppedge
H
aving never written a book before, I really had no
idea what to write here. Acknowledge people for their
impact on my life? Or limit to people who impacted
this book? Identify people with qualities that I aspire to? Throw
in a random stranger or two just to see if people are paying
attention?
I’m not sure I’ve answered this question in my mind. But
here goes.
On the professional front, I’ve had the good fortune to break
bread with some of the better minds and souls in the Managed
Service Provider (MSP) world. Rob Rae (Datto), Robin Robins
(Technology Marketing Toolkit), and Scott Barlow (Sophos),
among many others. They may deny knowing me (especially
after reading this book), but I know better.
And the world is full of good MSP CEO’s. Andrew Sharicz,
Bill Whelden, Dave Bell, and Damien Pepper and I meet each
week virtually to trade ideas. I mostly provide comic relief (and
steal their ideas). Jim Ray is another MSP with some really big
ideas and he’s the only owner of a redneck BMW that I know
of. Be proud, Jim.
I learned a lot (both good and bad) from a couple of bosses,
in particular, Bob Schneider and Rick Jones.
Ten years ago, I decided to start a company, Simplex-IT.
One of the reasons I was able to pull it off was due to its first
employee, Sam Hays, a complete Renaissance Man and one of
the sharpest good people I know. When he left Simplex-IT two
years later (under good terms), I was extremely concerned, but
VII
VIII Bob Coppedge
1
2 Bob Coppedge
My goal is help you, the CEO, understand why the geeks feel
what they do in terms of how it impacts your business through
three core concepts:
1. CEO Stuff that Impacts the Geek Side. What are you
using IT for now as it relates to your business? What
issues are you dealing with? How do you handle change?
2. Geek Stuff that Impacts the CEO Side. You rely on
your IT service provider to keep things running. But
you have to understand core concepts as it relates to your
business. Do they know what you consider to be critical
in terms of protection or performance?
3. Now What? Now that we’ve opened your eyes, you can
look at your organization and IT in a new perspective.
Big deal. It’s what you do with that knowledge that gives
it meaning.
The big corporations can afford to pay big bucks for a lot
of these concepts. There’s tons of stuff out there for the true
corporate world: millions of dollars in the budget and strate-
gic plans out the tuchus. And let’s face it. Your 5-year plan is
probably light on the IT side, with goals stated like “upgrade
server” or “redesign website.” I’ve spoken to a couple hundred
business owners and executives over the past 30 years or so who
had this type of conversation, and there have been a number of
them who have actually taught me a thing or two about how IT
impacts organizations in ways that I never considered.
balloon just as the rope up and snapped. The balloon took off
by itself. Now the CEO’s freaking out about how to deal with
the balloon. But then he relaxes and floats over the park for a
bit, no problem. Meanwhile, he sees a bystander who happened
to be walking down a path in the park. The CEO yells down,
“Hey, down there! Can you help me?”
The guy down below yells up, “Yeah, I can help you. You’re
up in a balloon. You’re floating around aimlessly and you can’t
get down.” The business owner says, “Shit. You must be an IT
guy . . .” The guy said, “Yeah . . . and how do you know that?”
The business owner replies, “Because everything you told me is
absolutely accurate, 100 percent spot on, and completely no use
to me whatsoever.” And the guy replies, “Well, yeah you must
be a business owner. And you know how I know that? Because
you’re the guy stuck up there in the balloon, you’ve got no way
down, and somehow it’s my fault.”
Feel like taking a balloon ride with me? C’mon . . . you know
you want to.
A CEO’s Survival Guide to Information Technology 7
2. INTRODUCTION
This is a survival guide to the business world of information tech-
nology. Although it’s intended for the CEO of a small-to-medium
business, anyone with interest in this topic should benefit (espe-
cially me if you bought this book—which, of course, you should.
Several copies, in fact).
Okay, anecdotal time. First of all, you should know that all
of the stories in this book are inspired by real events that I
experienced. I’m tweaking some of the details (like names), but
the gist is real.
Being a small business owner in today’s world of entrepre-
neurship is as rewarding as it is terrifying—the biggest challenge
being that you have to change. Everything is changing, no
matter what you’re doing in business today. Change rules the
day. Change rules our existence, especially the IT reality. In some
ways, it’s much easier for small businesses to change and to adapt,
to work in new things than it is for larger businesses. That’s the
good news. The bad news is that if you’re not prepared, change
can overwhelm you. So the opportunities for those who can
embrace change and take advantage of it are absolutely tremen-
dous. There will also be failures. There will be frustrations. There
will be risks. There will be losses.
And that’s okay.
The way we used to do things doesn’t work anymore. In IT,
this is like talking to somebody pre-industrial revolution versus
post-industrial revolution. An organization based on muscle
was overwhelmed by a competitor who used James Watts’
steam engine. It’s similar to what’s going on today, but the
speed of change today is overwhelmingly faster. Imagine a teen
today talking to a telephone operator about their job (ask your
8 Bob Coppedge
1
For a great description between today’s Information Revolution and the In-
dustrial Revolution, I highly recommend “The Second Machine Age: Work,
Progress, and Prosperity in a Time of Brilliant Technologies” by Erik Bryn-
jolfsson and Andrew McAfee
A CEO’s Survival Guide to Information Technology 9
3. WHY IS IT IMPORTANT?
The Best/Worst of Times. . .
This is part of why it’s so fantastic to be a small business today. If
you take a look at any part of the real picture, we are becoming
more and more a service economy. Even if we are producing
goods, our goods are still provided as part of the service. And
there’s actually a third component that’s being added . . . the
customer experience while gaining the goods and services. But
more on that later.
Oh, and that’s why it also sucks to be a small business today.
If you don’t have at least a passing understanding of information
technologies in terms of impact on your goods and services and
delivery thereof, well . . . your competition will. And soon.
Why is that? I hope I don’t have to explain the amount of
change that’s gone through the IT world over the past couple
of decades. Every aspect of sharing data and information (we’ll
talk about the difference soon) has increased in terms of flexibil-
ity, accessibility, and accuracy, while decreased in terms of cost,
skillset needed to consume, and applicability. So today small 1-3
employee organizations are using business intelligence tools for
$20/month that only a decade ago Fortune 500 companies were
implementing with a multi-million dollar budget.
The quantity and quality of tools available to the average
small business are staggering. And you ain’t seen nothing yet.
Progress
Here’s the thing. These changes have happened not only during
my lifetime, but during the lifetime of my career. So change,
significant, mind-bending, “time to rewrite the book” change is,
well . . . unchanging.
10 Bob Coppedge
4. YOUR IT PARTNER
As I stated earlier, I’m not going to try to teach you all the
nuances and technologies represented in IT. First of all, that’s
not your goal. Second, there are a ton of books that already do
that. Finally, IT changes. Daily. So I’d be out of date before I
published.
When you need legal advice (and you’re not a lawyer), do
you just Google it? Or accounting advice or tax advice? No (or
at least I hope not). And keep in mind that the rate of change
(and increase in complexity) in law and tax pale in comparison
to the rate of change for IT. So depending on how dependent
we are on the particular skill, we develop a relationship with a
resource that has that skill.
You need to develop that type of relationship for your IT
needs. I’m not talking about just someone to fix stuff that is
broken. That’s like hiring a handyman plumber to design and
install the entire plumbing for a water park. The handyman is
great for fixing stuff. But not in determining the best and most
efficient water flow for a super slide.
You want someone who will understand your business, what
your business needs and goals are, and can then relate them to
the appropriate IT tools that are out and available.
Summary:
• There are several strategies that companies use for IT
support. Identify yours. Is it working for you?
• Is the relationship you have with your IT partner a suc-
cessful one? Could it be better?
16 Bob Coppedge
5. DEFINITIONS
Before we get started, it might help to bring some definition to
terms we’ll be revisiting. Entire books have been written about
each of these concepts, and the definitions I’m using could be
challenged on many levels. But I think they’ll work for the pur-
poses of this book.
Complexity
One of the concepts I like to bring up when discussing IT pro-
cesses is “complexity.” The Oxford Dictionary defines complex-
ity as “the state or quality of being intricate or complicated as it
pertains to a business process or product.” Okay, I added the itali-
cized words for purposes of this book. Let’s add some meat to it:
One of the big points here is #3. Notice that I’m keeping the
definition of Complexity simple. It’s actually a pretty helpful
mind exercise. Let’s look at two examples of “How do you find
your year-to-date sales?”
Goofus: “Easy-Peasy. First, our Sales Manager has to run our
sales reports for the year, then creates an Excel worksheet. She then
A CEO’s Survival Guide to Information Technology 17
Data
He was an android who wanted . . . never mind. Data is one
of those terms that is thrown around loosely (like “cloud” or
“server”) and hard to pin down. For the purposes of this book,
there are really two types of data.
IT
First of all, anybody who believes they fully understand IT most
certainly does not. Physicist Richard Feynman said about quan-
tum mechanics, “If you think you understand quantum mechanics,
you don’t understand quantum mechanics.” The same is true here.
IT is so dynamic and so changing that it’s simply impossible to
keep up with all trends in all industries dealing with IT.
You don’t have to understand either. I want to help you
become comfortable in not knowing. You just need to grasp
some of the core concepts as a whole, so when you talk to a
technologist whose job it is to understand the core concepts
of the technology of that particular subtype of IT that you’re
looking at, they can explain things and you absorb enough to
have a framework of functional thinking to manage your overar-
20 Bob Coppedge
Stakeholders
Notice I didn’t say “customers” or “employees” or “vendors”
(nor did I say “ostriches,” though the temptation was palpable).
Stakeholders is a broader definition in that it includes all parties
that are directly impacted by the success (or failure) of an or-
ganization or project. Far too often, I’ve seen companies become
way too focused on one group of stakeholders, to the detriment
of the rest. The only way an organization can thrive and suc-
ceed long-term is through a balanced approach. But who are the
stakeholders? My simple list would include:
A CEO’s Survival Guide to Information Technology 21
Value
Ahhh, that brings up value, another concept that I like to try to
define. How can we talk about adding value to an organization
through IT without defining what the heck value is, anyway?
Once again, I like to keep it simple. My definition of value
is measured by:
1. Increasing Revenue
2. Decreasing Costs
3. Maintaining/Improving Infrastructure
22 Bob Coppedge
Summary:
• Many of the terms above have multiple definitions, de-
pending on the perspective and context.
A CEO’s Survival Guide to Information Technology 23
2
From Sophos’s Threatsaurus: https://www.sophos.com/en-us/security-news-
trends/security-trends/threatsaurus.aspx
A CEO’s Survival Guide to Information Technology 27
29
30 Bob Coppedge
Summary:
• A majority of these terms you don’t need on a daily basis
(if at all). Some of them will come up throughout the
book, or when dealing with your IT partner.
• As before, some of these definitions for these terms are
subject to perspective. Your mileage may vary.
PART I
31
32 Bob Coppedge
Summary:
• You don’t need to be a geek. You don’t need to be an
expert. But you need to have enough information about
the topic so that you, as CEO, can weigh your priorities
against your options when dealing with IT challenges and
opportunities.
CEO Stuff that Impacts the Geek Side 35
7. WHAT IS IT?
In the past chapter, I gave a general definition of Information
Technology. Great. But let’s face it, I gave a pretty vague defini-
tion. I mean, it’s not hard to understand Information Technol-
ogy from a gut level. But is there a better way we can define IT
by categorizing the purpose of the IT components being used
in your organization?
Note: You can skip this section if you want to stay away from
the geek stuff as much as possible. But this isn’t going that deep
into the geek. I promise.
I had the opportunity on Nov 9, 2017, to hear a keynote
address by Arnie Bellini, ConnectWise CEO, at the 2017 IT
Nation conference4. ConnectWise is one of the major vendors
in the Managed Service Provider world, and Arnie is recognized
as one of the main voices (and visionaries, a description I don’t
often use). He spoke to the 3,500 or so (including yours truly)
on the state of the industry.
He did a great job of taking the vast array of devices, appli-
cations, services, buzzwords, strategies, and approaches aimed at
business that are constantly in a state of change. He broke IT
down into 14 components in terms of purpose, referring to it
as the “technology canvas” for business. They are illustrated in
the graphic below (recreated from Arnie’s keynote):
4
Wanna watch the keynote?: https://youtu.be/QFMzNAL69Y4. The second
half is mostly about products for MSP’s, but the first half is useful to every-
body trying to compartmentalize IT for the purpose of this topic.
36 Bob Coppedge
Not all companies use all 14, and any IT product might (and
often will) fit under several components. Microsoft’s Office 365,
for example, has its toes in Collaboration, Office Applications,
Onsite Computing, Cloud Computing, and Business Intelli-
gence. I think it’s important for CEO’s to have at least a modest
understanding of these components of IT. So here goes (the
specific definitions, by the way, are mine):
5
You can download this worksheet (and other tools) for free at http://
Simplex-IT.com/BobsBook
40 Bob Coppedge
Critical: In this section, the higher your score, the more depend-
ent on IT your organization is. If you scored 3 or greater, you
need to make sure you’ve invested enough in IT (especially in
the categories that are either critical or support your critical
needs).
Satisfaction: In this section, the higher the score, the greater
the comfort level that the resources you’re allocating are both
successful and appropriate. If you aren’t at the point where
you’re investing heavily in Business Intelligence (low critical),
then you can be satisfied with little or no results because it’s in
line with your expectations. Dissatisfaction here could be you’re
not seeing a bang for the buck. It’s a question of defining the
value.
Improvement: The higher the score, the more we need to do.
This is our call-to-action list. We know we need to improve these
items, because they’re either actually damaging the organization
or represent a great opportunity.
But here’s the key thing. You now have homework. From
this simple exercise, you now have something measurable and
possibly some things you want to follow up on. Here are some
sample next steps:
Summary:
• The definition of “what is IT” could be a book unto itself.
This method of categorization is a helpful way to identify
components.
CEO Stuff that Impacts the Geek Side 43
1. How IT does impact your business, for both good and ill.
2. How IT should impact your business, but doesn’t.
44 Bob Coppedge
6
The rest of the questions are based on third party applications but can be
modified to cover home grown.
46 Bob Coppedge
Now, the above list is a good starting point, but it’s a static inven-
tory of pieces and parts. It doesn’t address what these things do
(or don’t do) in terms of impact on your business.
We’re getting there.
Summary:
• As stated in the beginning, this is taking the metaphor in
the previous chapter and digging down deeper. By now,
you should be able to identify some of the critical systems,
applications, and services in your organization and know
how comfortable you are with your knowledge of them.
56 Bob Coppedge
Summary:
• Take a moment and think through the systems, applica-
tions, and services that your organization uses in order to
process your business.
• If you could “ask that data” anything, what would you
ask?
• Do you have that kind of access to the data? If so, how
are you using it? If not, why not?
58 Bob Coppedge
It’s the usage of the information that truly creates the value,
and the technology allows us to do that. Our job is always to
create great value for the organization and customers using our
IT resources.
Why am I bringing this up? Because we’re in the third phase
of a decades-long transition. When IT first hit the scene for the
SMB market back in the 80’s, the primary goal was the imple-
mentation and improvement of the technology. The business
process that IT performed was pretty much the same as we did
manually (general ledger, word processing, spreadsheets). The
technology was the shining star. We based upgrades primarily
on the improvement on the tech side of things. New systems
CEO Stuff that Impacts the Geek Side 59
Summary:
• It’s not enough for businesses to simply gather data to
“do the work.”
• Can you mine your data to develop information that’s
useful to you?
• Can you mine your data to develop information that’s
useful to customers, thereby adding value?
CEO Stuff that Impacts the Geek Side 61
data. Far too often, CEO’s think their reports are completely
dependent on the ones provided by their applications.
BI Tools is another example of where services and tools that
were available (and expensive) to large enterprises are now avail-
able to the small-to-medium businesses.
Summary:
• What three questions would you ask of your business
systems? How close are you to seeing the answer in your
existing reports?
• What external data would create additional value? Census
data? Customer data?
• What questions would you ask if you had that additional
data available?
CEO Stuff that Impacts the Geek Side 63
The bottom line is that we want to “do more with less.” Keep
in mind that the term “less” more often means time, not $. The
quicker turnaround for almost any process is viewed as increased
value.
7
http://money.cnn.com/2017/11/11/technology/singles-day-china-alibaba/
index.html
8
But not for long. http://www.mercurynews.com/2017/11/20/uber-steps-
up-driverless-cars-push-with-deal-for-24000-volvos/
CEO Stuff that Impacts the Geek Side 65
Summary:
• IT needs to be considered when planning changes to your
business.
• Customers want options when they’re making purchasing
decisions.
• Customers also don’t want complexity. The options need
to be as seamless as possible.
• You may think things are automated, but are there parts
that are still done by hand for all the wrong reasons?
• People fight abrupt change, unless there’s a compelling
reason that they can identify with to embrace change.
• People don’t notice gradual change, even if it’s detrimental
to them.
76 Bob Coppedge
• The older a device is, the less likely the original vendor
will support it (especially for infrastructure devices like
switches and UTM’s).
• Servers are critical. We keep them on the original manu-
facturer’s warranty and replace them when they’re off the
warranty (or buy very expensive extensions).
• Workstations (desktops and laptops). We don’t extend the
warranty (unless they’re critical, like CAD stations).
2.
Replace workstations spread out annually over X
years. Same example as above, but the replacements are
spread out. With the same 5-year plan, each year we’re
replacing 20% of the 50 workstations, or 10.
3. After the warranty expires, replace them when they
break. This may seem like the “cheapest” way to do it,
but not really. When it’s time to replace workstations,
it’s an unplanned event, which is never efficient in terms
of time and productivity.
Summary:
• Obsolescence is not cut and dry.
• Obsolescence can’t be simply defined by “does it still work
well enough?”
• Have a strategy for upgrading.
• There are many hidden dangers of obsolescence.
• Maintain manufacturers’ warranties for operationally crit-
ical devices.
84 Bob Coppedge
<now you can reverse the special effects, but add some sweep-
ing music, credits, and the like>
Okay, screenwriting isn’t in my future. But you get the idea.
Management by Abdication is a horrible management style, but
it happens all the time in the SMB market.
Often when we first look at a new (to us) organization, we see
what I call the “Geological Dig” of IT (we discussed this before).
This is when we can see where an organization added pieces or
layers of technology at various points without a real structure or
strategy. Some examples:
Oh, woe is Goofus. Goofus has at his fingertips more tools and
capacity for running his business effectively than was conceivable
even five years ago. And this technology can impact his organ-
ization on every level—product, process, employee, security,
quality assurance, accounting, disaster planning, future planning
and forecasting. You name the level of process within the organ-
ization, and IT is there, whether you want to admit it or not.
88 Bob Coppedge
Starting point:
“Hey, let’s add these graphic cards for our CAD workstations! Their
processors will help render drawings two to three times faster than
the older graphic cards we were using!”
Outsourcing as a Solution?
Goofus: “We’re paying a fraction of a cost by having a completely
outsourced IT resource. Any time we need anything, we contact
them, and they’ll work on it for peanuts (as opposed to having
in-house staff or one of those ‘Managed Service’ doofuses). Sure,
there’s a learning curve when we bring them up on projects, but some
of these folks are pretty darn sharp! They’ll implement whatever we
ask them to, so we must be sure about our requirements. And it’s
never the same person working on our issues, so we have to explain
everything all over again. Once we asked them to update our sales
reports and we didn’t fully define what constituted a sale. All our
reports were done wrong. That took some time to clear up, but the
savings are worth it!”
look to help bridge the gap between technology and the business
process, then their benefit versus outsourcing is gone.
Larry should have explicit knowledge and experience of your
business, including strengths and weaknesses of the organization,
personnel, and IT infrastructure. Trust and understanding.
But that’s only if the organization and Larry make that happen
together. If Larry doesn’t bother learning about the company
and the people (unfortunately, a pretty common occurrence),
that’s taking two legs off of the three-legged stool. And if the
management (uh . . . you?) doesn’t make it a priority for Larry
to do it, well then. . .
This mistake honestly makes it all the easier to justify elimi-
nating Larry’s position, because he’s focusing on the services that
are the easiest to externally recreate at a lower cost.
Let’s introduce a new concept: “Co-Managed IT.” Okay, it’s
not a new concept (Gartner first started using the term back
in 2012). But it only recently has been scalable enough for
small-medium businesses (SMB’s) to take advantage of it.
Co-Managed IT is a pretty simple concept from a 30,000-
foot view. It’s a combination of both internal and exter-
nal (outsourced) resources for the actual management of IT
resources.
Now hear this: Co-Managed IT is coming. Like everything
else, it’s a management implementation along the lines of “the
right tool for the right job,” with the flexibility of taking that
pretty deep into your organization.
Co-Managed IT is a combination of internal resources and
other resources being used to manage IT. There are two basic
models. The first model is where you have the IT Management
(CIO/CTO (Chief Information/Technology Officer in larger
96 Bob Coppedge
Stuff breaks. Systems fail. Bugs pop up. Bottom line is, stuff
happens.
The question is, are you doing what you can to minimize the
failures? Like any equipment (including the human body), not
CEO Stuff that Impacts the Geek Side 103
Now, that seems a little simple. ‘Cuz it is. We can (and should)
make it more complex because almost all of these can be either
purchased, leased, rented, or “As A Service” (it’s a fancy term for
rent, more on that later).
A lot of this is driven by obsolescence. We’ll cover the defini-
tion of obsolescence in much more detail later. For now, let’s
keep it limited to cost control. Anything involving IT will
become obsolete, but here’s the key issue (and take this to heart):
YOU decide what is obsolete within your organization. Not
the industry. Not the consultants. Certainly, not the vendors.
Absolutely listen to them. But do not abdicate your responsi-
bility to your organization.
With new customers, we try to get a feel of their definition of
obsolescence with the hardware, software, and services they are
purchasing right off the bat. With manufacturing customers, we
often joke that “if the lights come on when you flip the switch,
it’s not obsolete.” So they’re used to buying something with an
investment in capital costs up front. This new product of theirs
will then be driven into the ground, which could be 10, 20, even
30 years if it can be used effectively for that long.
Not so much for IT investing, which is tricky.
IT changes. Quickly. And the costing model is switching from
capital investments to monthly investments. This is a great thing
if you’re looking to smooth your expenses over time and avoid
huge spikes in expenses. If you like buying stuff and running it
into the ground, you’re going to be annoyed.
110 Bob Coppedge
Summary:
• There are a lot of common reasons people when explain-
ing problems in IT.
• Often there are underlying issues.
• Don’t just “make the excuse.” Find out what’s really going
on.
PART II
113
114 Bob Coppedge
The question is, what’s our final last-ditch solution for all
these problems?
If you answered, “Update my resume,” you’re probably not
the CEO and probably caused the problem in the first place.
The right answer (if for no other reason than it’s the subject
of the chapter) is “Restore from Backups,” congratulations. You
win!
Backups are about the most boring aspect of IT, right up
there with software licensing. They don’t increase revenue. They
only add cost. But they’re the last line of defense for almost
anything that goes wrong involving IT. No matter what the
problem is, if all else fails, a good backup means you’re not
completely screwed.
Notice I sneaked the word “good” in there? Probably 20%
of the new customers we bring on board haven’t had a good
backup for several months. Usually, they were told the backups
were good by the prior support folks.
Backups are the ultimate mulligans for companies in the
sense that you get to either recover or undo some data that
was either appropriately or inappropriately removed or updated.
Sometimes the data was mucked up through system or hardware
failure. Sometimes by malicious activity (like ransomware), or
the eternal “oopsie” from an end user. Backing up all of this
data is your insurance policy; and no matter what the cause,
the last line of defense is your backup copy of the data or the
application.
This section is focusing on making and storing the backups.
We’ll talk about using the backup in case of a disaster in the
section about Business Continuity.
Geek Stuff that Impacts the CEO Side 115
back of the St. Bernard running through the Swiss Alps with a
keg of brandy? Is it good brandy? Can I have some?
You need to know where the backups are located. If backups
are stored in the same building as the computer (and not in a
fireproof vault) and that building burned down, it’s not going
to be terribly useful. IT back up strategies are based on relative
simple logic. Reviewing the basics never hurts.
Also, consider if disaster does strike, we need to know how
long your business can afford to be without access to informa-
tion, as well as what the cost of being down is (more on that in
the “Business Continuity” section).
On the one side, we want to get to that backup set as quickly
as possible. On the other hand, we don’t want the backup to be
a victim to the same catastrophe. A backup set that’s encrypted
by ransomware is essentially useless.
My recommendation is that server backups should be in at
least three locations:
Notice that I’m not talking about taking drives offsite. That’s
because I think that any backup strategy has to be automated.
The days of relying on even trained, skilled, responsible people
(so I’m automatically disqualified) to remember every week or
day to swap hard drives or even tapes are long over. That’s not
what you’re paying people for, and if you swap weekly every
Friday, your company is at risk of losing up to a week of work
(think bad things happening on Thursday).
Example #2
It’s great to have backups. But you need to make sure they’re
safe. By that, I mean you want them to be separate from the
device they’re backing up.
Let’s take a company that has a single server. They backup the
server to a removable hard drive that’s connected to . . . wait for
it . . . the server. The power supply goes wonky and creates a
huge spike that hits everything . . . including the backup drive.
Server and backup are now toast.
Any backup device that’s physically connected to the network
at your location is physically vulnerable to the same threats as
the rest of your network. This means a disaster is equally effec-
tive against your backup device as it is against your server . . .
bad news.
Geek Stuff that Impacts the CEO Side 125
Summary:
• Just like security, your backup strategy should be reviewed
by a competent IT partner. Yup, Simplex-IT comes to
mind. What a shock, right?
• Backups are one of the most critical components of any
organization’s IT strategy.
• If it’s important, it should be backed up.
• And monitored.
• And tested.
• Here’s our approach to backups:
űű On Premise devices
126 Bob Coppedge
űű Cloud Servers
The configuration of the cloud-based servers
should include the same layer of backups as
on-premise servers, although the tools to accom-
plish this will differ somewhat.
űű Cloud Services
Cloud services should be reviewed to understand
their default backup offerings.
If necessary, either the original vendor or a third
party solution should be implemented and mon-
itored.
128 Bob Coppedge
Scope Matters
I’m an IT guy. This is a book about IT. So, we’re mostly going
to talk about IT stuff. However, disasters aren’t picky. A disas-
ter can have nothing to do with technology. That group of 10
employees who go in on lottery tickets wins big. Your biggest
customer representing 25% of your revenue goes under. Your
9
“CompTIA Quick Start Guide to Business Continuity and Data Recovery”:
https://www.comptia.org/resources/comptia-quick-start-guide-to-business-
continuity-and-data-recovery
Geek Stuff that Impacts the CEO Side 129
10
The absolute best Sherlock Holmes of all time.
132 Bob Coppedge
accepting the risk. This saves us from the expense of the second
tire and gives us the additional trunk space.
Let’s answer these questions. Remember the discussion we
had earlier on scaling? The same conversation is true here. You
can get as detailed here as you’d like. And you’ll probably want
to include some of your business process and IT resource folks.
For each identified portion of your business (whether it be
process, department, product), you should identify:
Not sure how to prioritize? Consider for each Bad Thing and
you’re close to defining your risk. It’s:
Risk = BCOD (previous section) ✕ likelihood.
I usually find that companies have a higher risk than they
realized. I also usually find that companies have a lot of (relatively)
Geek Stuff that Impacts the CEO Side 135
• Equipment failover
• Service (ISP) failover
• BDR based local virtualization
• Cloud based backups/virtualization
• Mobile users
• Cloud services
• Specialized people
• Communication
Summary:
Here are a few steps you should take at a minimum:
11
According to Sophos
12
http://www.simplex-it.com/2018/01/meltdown-spectre-patch-not/
Geek Stuff that Impacts the CEO Side 141
And you can draw whatever conclusion you like from the
DNC hack.
But back to the smaller-to-medium business world. Back in the
day (prior to 2012), the viruses were what was really annoying.
These were the viruses that replicated between computers and
created havoc to the SMB world, often by destroying data on
computers. But the bad guys didn’t get any money for it. They
weren’t profitable, which meant that the people who were creating
these “tools” were just being jerks. Their goal was to see if they
could do it. Their goal was to vandalize just because they happened
to be technically skilled and could. Cyber security was relatively
in its infancy, with many companies (large and small) giving it
lip service at best. The only parties that made money from these
activities were the anti-virus companies and the consultants who
were paid to clean up afterwards.
Then ransomware started surfacing. Instead of destroying
your data, the aim was to encrypt it, and only they had the key
to decrypt the data. The attacker would then charge you a fee or
ransom if you wanted to recover that data safely. They accom-
plished this by developing a program and getting it to run on
your network. This was done by either tricking an unsuspecting
user to run it for them (from visiting a malware infected website
or email), or forcing their way onto the network by taking advan-
tage of holes in the network protection. The program would
reach out to the bad guys’ mothership and get an encryption
key. Then it would go to town and encrypt every document it
could get its hands on, using very effective encryption tools.
The FBI has said if you’ve got it encrypted, pay the ransomware
costs because you can’t go around them (with some exceptions).
142 Bob Coppedge
The challenge is, the bad guys are greedy. They are financially
incentivized to find new ways to get money from the good guys
(us). And since they’ve got the money, they’re willing to invest
big bucks to make it happen.
Yup, we’re talking about evil entrepreneurs. But instead of
hiding out in secret underground bases with henchmen, cackling
evil laughs and snappy repartee with the latest James Bond “No,
Mr. Bond! I expect you to access a Flash enabled website without
properly patching Flash on your desktop, allowing an attack on
your workstation to take advantage of the vulnerability, get past
your unsuspecting firewall, get an encryption key and convert
all your critical documents into encrypted mush. . .if you don’t
pay me . . . Five . . . Hundred . . . Dollars!”
Yeah, I know. The laser scene in GoldFinger was cooler.
Here’s part of the challenge. A lot of the bad guys live in
countries where this sort of thing isn’t only legal, it’s a vital part
of their economy. So not only can they operate in the open
(relatively speaking), they can actively hire (and pay) the best and
the brightest folks to be bad guys with an offer of a regular job.
And what have they done? They’ve created some great, quality
products (okay, they’re evil products, but still . . . high quality).
They’ve done a great job of “marketing” (as in getting their
“customers” to consume their products). And they’ve (mostly)
priced their products reasonably. So most “customers” can afford
to pay it.
This is a tough concept to get your head around, but it’s
important.
Today’s hackers have more in common with businessmen and
entrepreneurs than ever before. And that’s what makes them so
dangerous.
144 Bob Coppedge
Breaking It Down
Here’s the approach we’re going to take. Cyber Security is a
crime, right? And when we watch TV crime dramas, what are
the three aspects of a crime always being brought up? Motive,
Opportunity, and Means (you can play the “Law and Order”
sound track in your mind right now, if you want. I’ll wait).
Motive: What was the reason the bad guy committed
the crime?
Opportunity: What was the chance provided to the bad guy
to commit the crime?
Means: The bad guy has the ability to commit the
crime.
Motive:
This is a book about business, so we’re going to keep the topic
focused there. But if you imagine any motive for any crime,
there’s a place for that in Cyber Crime. Personal motives, crimes
of passion, just being a jerk. But for our purposes we’re going
to limit it to:
• $ (through ransom)
• $ (through trickery)
Geek Stuff that Impacts the CEO Side 145
• $ (through blackmail)
• Credentials
• Identity Theft
• Critical Business Information
• Online Reputation
• Access to Resources
• Inflict Damage
Notice that in some cases, the victim might not even realize that
they’ve been successfully attacked. Sometimes precious information
can be copied (think financial, customer info, credentials). Other
times the computer is used to perform tasks in the background
under the control of the bad guys. Or recording keystrokes, or
even taking control of the video camera on your laptop. During
all of this, the victim is unaware of any of these activities.
Opportunity:
In order for the bad guys to win, they need to have some level
of interaction with you (or your technologies). This means that
you either “go to them,” or they need to “come to you.” Some
examples:
Means:
If you remember back in the beginning, we defined the term
“Exploit.” It’s a vulnerability in a system which can be exploit-
ed by the bad guys. The vulnerability could be found in any
component or device that has access to your IT resources. Most
malware takes advantage of at least one exploit.
There are five popular ways to introduce the malware to the
unsuspecting public.
Every step listed above (by the way, this is a simplified process)
involves a different type of technology, with several different
owners and vendors. Steps 1, 2, and 9 are your computer (or
mobile device). Steps 3 and 4 are the coffee shop. Steps 5 and
6 are (probably) the Internet Service Provider (or “ISP”) for the
coffee shop. And 7 and 8 are in the hands of the vendor who has
the remote resource that you’re interested in (and they possibly
have several layers of technology and vendors on their side you
don’t see).
As each step uses technology components specifically created
to interact with other components, each component also has
potential exploits that can be used by bad actors to gain access
to some level of this process.
This, unfortunately, makes sense. Every component that’s
been created to aid in communication between devices carries a
risk. A wall with a door is more vulnerable than a wall without.
Geek Stuff that Impacts the CEO Side 149
14
For a vendor-neutral description, check out: https://en.wikipedia.org/wiki/
Trustworthy_computing
150 Bob Coppedge
Summary:
Here are the key takeaways from this chapter:
Bring Somebody In
As I’ve mentioned throughout this book, I’m not trying to make
you an expert in IT. I’m also not trying to “sell” you a specific
solution to this complicated problem, especially since the solu-
tion would be obsolete the instant the book was published.
What I am trying to do is to give you enough information to
help you make informed decisions and have informed conver-
sations with the “experts” that you bring in to help you with
your organization.
Depending on the size and complexity of your organization,
you may not need to bring in an organization that specializes
only in Cyber Security (although you should certainly consider
it if your needs are high). But you should make sure that your IT
resource is reasonably up to date on their skill sets and solutions
and ask them what they do to keep current.
Geek Stuff that Impacts the CEO Side 153
Backups
I just want to restate that at the end of the day, a secure and test-
ed backup strategy is your last line of defense when it comes to
protection against data loss. By that, I mean all your important
data, which includes data on all systems that remote employees
are using.
To repeat . . . untested backups aren’t backups. They’re
promises. I would estimate that 20% of the companies we’ve
reviewed for possible services have had problems with their
backups, from not working at all to not backing up everything.
In many cases, management was unaware of the problem.
Mind your backups, boys and girls.
Layers
Not too long ago, security was a simple thing. Passwords. Then
it was passwords and anti-virus software. Then we added fire-
walls. Then we added . . . and so it went on. Again, I’m not going
to get technical. But let’s walk through the layers of potential
security from opening up a simple email sent by a bad actor:
Cyber Insurance
Yup, we’re talking old-fashioned insurance, but aimed specifi-
cally at your IT side of things. Policies are now available (and
at pretty reasonable costs) that provide coverage for exposure
of PII or PHI (Personally Identifiable/Health Information), PR
expenses, forensic expenses and more. Be careful when you’re
talking to insurance agents offering these policies, and make sure
to include your IT Cyber Security resource in the conversation.
156 Bob Coppedge
15
https://news.sophos.com/en-us/2015/08/17/join-the-sophos-firewall-rev-
olution-project-copernicus-beta-now-available/ keep in mind that this is over
2 years old, and much has already been implemented.
Geek Stuff that Impacts the CEO Side 157
16
Seriously, drop me an email at [email protected]
Geek Stuff that Impacts the CEO Side 159
Summary:
• Bad guys only have to find one vulnerability in your
Cyber Security Strategy. Your Cyber Security strategy has
to protect or remove all easily discovered vulnerabilities.
• If your Cyber Security devices aren’t configured proper-
ly or monitored and actively managed, you lose half the
protection (or more).
• Cyber Security needs to be kept up to date.
• Patch Windows. Now. Keep them up to date.
• Patch other tools (Java, Flash, etc.). Now. Keep them up
to date.
• Train Employees.
• Don’t forget Cyber Insurance.
• Work with an IT firm that brings the appropriate Cyber
Security experience. I’m thinking Simplex-IT, of course . . .
but that’s just how I roll.
• It. Doesn’t. End. Ever.
162 Bob Coppedge
20. PEOPLE
“I love Mankind. It’s People I can’t stand.” - Linus Van Pelt
At the end of the day, people can make or break your organ-
ization. On behalf of all IT folks, we’ve tried to automate as
much as possible. But you’re still left with . . . people. Whether
we’re talking security, productivity, customer retention, opera-
tions, marketing, product support, development, or shop floor
productivity . . . people are going to interact with your IT
resources. Forget the warm and fuzzies about employee satis-
faction; you need to create an environment where employees
are given full freedom and resources necessary to do their job
properly (and no more). And that environment needs to be
properly communicated to the employees, with the opportunity
for feedback.
Keep in mind, IT changes. Incredibly quickly. This means
that your organization has to adapt to the new realities that IT
provides. All the security services, systems, and devices in the
world can’t protect you effectively when an employee blatantly
does things that open your organization up to compromise.
Similarly, untrained employees often don’t take advantage of
the tools provided because they don’t know how.
Let’s talk about the big four:
IT Training
Well-trained employees are more effective, motivated, and just
better. Hopefully, that’s understood. There’s no question that
164 Bob Coppedge
Employee Turnover
What do you do for exiting employees regarding IT? This is
especially critical if the parting of ways ain’t under the friendliest
terms.
Email
Handling the email for a former employee is also tricky. Tech-
nically, it’s straightforward. It comes down to a few questions.
Let’s take the case of John Smith is leaving Acme Widgets, and
his last day is today:
BYOD
We want people to be productive. We want people to be pro-
ductive when they need to be. A lot of people own their own IT
devices, whether it be tablets, PC’s, mobile phones. They may
want to use those devices to do their job. This would make them
more effective and efficient than they would otherwise be. We
like increased productivity, right?
Here’s how the question is asked:
“Hey, boss. Can I use my home computer to access company
applications over the weekend? That way I’ll be able to complete
the project on time and not cost you any additional money.”
Wow. Your answer is absolutely Yes (and probably with a
teary-eyed “You had me at . . .and not cost you. . .”)!
Same question, phrased a tad differently:
“Hey, boss. Can I use my home computer to access company
applications over the weekend? You have no idea whether I’ve
got malware and viruses on it, or whether it’s been hacked and
people are recording all my keystrokes. But that’s okay, if I’ve
got a virus, I’ll be sure to share!”
Geek Stuff that Impacts the CEO Side 171
Summary:
• Train your people to use IT resources responsibly. Espe-
cially on Cyber Security issues.
• Create an onboarding procedure for new employees.
• Create an “offboarding” procedure for employees leaving.
• Review the PnP categories included here and decide
what’s important for your organization.
Geek Stuff that Impacts the CEO Side 173
21. PLUMBING
“My computer is just too fast. Can we slow it down somehow?”
—Said nobody. Ever.
Plumbing Matters
One of the most frequent complaints about computers is, “It’s
too slow.” And often it becomes a finger-pointing session be-
tween the users and the IT resources. It’s right up there with,
“This chicken tastes funny,” and “There’s something not right
with my car.” It tells us there’s a problem, but doesn’t go far
enough to tell us where to look.
But it underlies a critical point. The success of your organi-
zation is in part dependent on systems running “fast enough.”
Sometimes the challenge of “slow computers” is because the
hardware is underpowered. Sometimes the users have unrealistic
expectations. As Douglas Adams said in Hitchhiker’s Guide to the
Galaxy, “Time is an illusion. Lunchtime doubly so.”
One other area to consider is data flowing between devices,
networks, and locations (even between continents). Data flows.
Everywhere. Whether it be:
1.
You’re using your network for your phone system
(VOIP) and nobody’s paying attention to the network
traffic (voice data should be handled very different from
other types of data).
2. You’ve got wireless connections galore.
3. You’re housing a web server at your location, bringing
people into your network.
4. You’re providing remote employees with business re-
sources housed within your physical location.
5. You’ve got devices using both wired and wireless at the
same time.
6.
You’re not monitoring your network traffic, from a
quantity, quality, or security perspective.
Internal Network
The figure above is a simplified representation of most business
networks—the stuff inside your building talking to each other
through a combination of wired and wireless connections. Let’s
walk through the pieces:
connections (both labelled #3) between the server and the switch
should be as robust and have as large a “pipe” as possible.
Any time you’re looking at slowdowns, trace the map from
the device of the user that is experiencing the slow down to
its destination (say a server) and back. Those are the potential
culprits (including the devices themselves).
To the Cloud!
Back in the day (warning: Geek nostalgia time) when I was
“young,” I had a device that used a modem giving me a blinding
speed of 300bps. Yup, that’s 300 bits, which at 8 bits per byte
or character translates to 37½ characters per second. So in one
second, I could transmit: “I feel the need . . . the need for
speed!!” and really, really mean it, and have a half second left
for reflection.
Boy, have we changed and improved since then.
First of all, the modem was primarily a one device, one
modem, one phone line, one connection kind of thing. Now
we have ISP (Internet Service Provider) connections, which
offer several different types of technologies for connecting your
organization to the Internet. And we’ve gone through several
different technologies: DSL, T-1, cable, fibre, microwave, and
satellite, just to name a few.
A couple of things to keep in mind:
But that just gets you to the Cloud, the Internet. Let’s say
you want to connect to a cloud-based service. That can be
anything stored anywhere outside of your network, whether it
be a website, cloud service, remote desktop, streaming video,
vertical application, or any other service. The traffic goes
through your network, through the UTM out to “the cloud”
through your ISP. Then it continues through to the host of
the service, to the servers providing that service on their site
(by way of UTM’s and switches on their site). They read your
request and send the response back to you (retracing the steps).
Your device then presents the response to you (in the form of
Geek Stuff that Impacts the CEO Side 181
Remote Plumbing:
Cloud Services
When users inside your office connect to an internet service
(whether it be a web site, services like Office 365 or cloud re-
sources like Microsoft Azure or Amazon Web Services), they
all connect through your internet connection provided by your
Internet Service Provider (or ISP). Everybody in your office is
using that connection, so it’s important to have a big enough
pipe (bandwidth). The Cloud Provider usually has enough
bandwidth on their side.
Remote Users
Users from outside your office often need to connect to services
located on your site. This can be employees, customers or ven-
dors. They could be working from home, or a coffee shop, or
their own business locations. They could be accessing files, a web
site or applications located on your internal network.
For them to connect to your network, plumbing first takes
them through the network that they’re currently connected to,
with the same speed constrictions you face. Then they go through
the cloud and then to your resources on your on-premise network.
The reason this is important is that if your remote user is
connecting at a coffee shop that doesn’t see the need for a
high-speed connection, their connection is going to be poor
and there’s nothing you can do about it. The performance for your
connection will be no better than the slowest component in the
connection chain.
Mobile Devices
For mobile devices, it’s a similar diagram, with one exception.
The mobile device often connects through the Digital Network
Geek Stuff that Impacts the CEO Side 183
Summary:
• Don’t get bogged down in the subtle nuances. 1Gb is
1,000 times faster than 1Mb.
• What’s your Internet speed? Find out! Also, find out the
last time you checked with your provider for faster or
cheaper connectivity.
• Are your switches all Gb (gigabit) or faster?
• Are your switches all managed switches? And are they
configured properly?
• Do you have a separate wireless network for employees
and guests?
PART III
Now What?
22. BOB’S IT TREND REVIEW
When I started in the wonderful IT world (wrote my first pro-
gram in 1975 in high school on a Digital Equipment Corporation
PDP-8), IT for small-to-medium organizations (let alone individ-
uals) was a pipe dream. If you wanted something typewritten, you
used a typewriter, which is essentially the same device in terms
of core functionality from its origin in the late 19th century. We
stuck with the typewriter until the word processor replaced it for
the majority of businesses in the 90’s. Since then, new concepts,
trends, services, and delivery models have constantly been invent-
ed, re-invented, and discovered. Unfortunately, many times the
definitions are driven by the primary vendors of the new service
(or the vendors of the services threatened by the new stuff).
What we’re going to do here is review a lot of the newer
concepts and give fairly simple definitions. Fair warning, many
of them will be generalizations. Someone concerned about 100%
accuracy will probably be cursing my shadow halfway through.
It’s not unusual for the new concept to be actually old stuff
with a twist.
But there’s nothing like a good buzzword or TLA (Three
Letter Acronym) that makes an IT geek feel superior. If it’s a
relatively new or hot new term, we could even be talking about
a 10-20% increase in a consultant’s hourly rate!
With that, let’s dive in!
185
186 Bob Coppedge
3D Printing
3D printing is a process where a device (which can be as simple
as a reconfigured inkjet printer) is used to take a design created
using any of several Computer-Aided-Design (CAD) packag-
es and “print” them by adding material (usually some kind of
polymer) one layer onto another. A simple 3D printer can run
well under $2,000.
One of the first popular uses of 3D printing was for proto-
typing samples during the design process. As the technology
matures, 3D printing is now used for actual final product, includ-
ing metal. Another term often used is Additive Manufacturing.
Printed parts are becoming more and more accepted as
providers of manufactured products.
Big Data
The term Big Data often seems to be an offshoot of Big Broth-
er, coined by George Orwell in his dystopian novel 1984. The
Hollywood implication is that through Big Data, everything is
known about everybody all the time.
Ah, no. Big Data is based on four significant advances in
technology, all happening in the past decade:
<blank> as a Service
It started with “Software as a Service,” or SAAS. Then it was
“Hardware as a Service” (HAAS). Followed by “Infrastructure
as a Service” (IAAS). And there actually is a “Ransomware as
a Service” (RAAS, for those who want to be a crook and thief,
but don’t want to actually do the work). The latest concept
is “Security as a Service” (SecAAS). Other terms I’ve run into
are (I’ll just use the first word here to save trees): Data, Func-
tion, Logging, Mobility, Monitoring, Payments, Platform, and
Recovery.
Simply put, it’s renting—except instead of renting a home or
piece of equipment, you’re paying a monthly fee for whatever
the heck it is the third party provides. Depending on the offer-
ing, either all of the monitoring and maintenance of the offering
will be provided through that monthly fee or you’ll be given the
tools necessary to monitor and manage the offering yourself.
188 Bob Coppedge
Cloud
Okay, here’s the fun part. There is no specific definition of “the
cloud.” Everyone from the media to vendors have bastardized
the definition for the sake of either simplicity or to further their
own product launch.
Now What? 189
Internet of Things
Any device that can have built-in capacity (technology) to help
it perform its function can be enhanced to extend its controls or
share its data through the Internet. This is manifested in three
ways:
Net Neutrality
This isn’t a technical issue, but it will probably affect all of us.
The Internet has long been a place where Internet Service Pro-
viders (ISPs) cannot favor data over another based on user, con-
tent, platform, website, service, application, or the like.
ISPs (and some larger content providers) would like this to
change. If they could charge content providers extra for “faster”
speed, this gives them an additional revenue source. An ISP can
make the website or streaming media 25% faster if you go to the
“preferred” vendor (who’s kicking in the extra $’s for this to happen).
Most in the tech world (outside of ISPs) oppose the idea,
saying that it would put startups in a position where it would
be very difficult to compete.
In 2015, the Federal Communication Commission (the FCC
in the US) officially adopted net neutrality. As of this writing,
the FCC is reversing that.
Social Media
There are a lot of books out there about social media and busi-
ness, and I won’t pretend to be an expert on it. However, there
are a few things you need to consider:
Virtualization
Back in the old days, if you wanted a server, you bought a server.
A physical device. Need two servers? Buy two. Need five? Buy
five, and so on. Somebody had the brilliant idea, what if we
combined these servers into one physical device?
In other words, there’s one physical server. It’s running (as
separate programs) each of these separate servers, sharing the
physical resources like memory, hard drives, CPU’s, power
Now What? 195
Okay, you’ve read the book (you have, haven’t you?). Now you
need to make a checklist of what your “to do” list is. Here you
go:
203
204 Bob Coppedge