assyst Blog

9 data security best practices for your business

9 data security best practices for your business

Ensuring data is protected and secured is a given, but actually doing so can be a daunting challenge. As cyberattacks and data breaches become more sophisticated and advanced, how can you ensure you have the right practices in place?

Read Story

What is ITOM (IT operations management)? | ITOM explained | ITOM vs ITSM vs ITAM

What is ITOM (IT operations management)? | ITOM explained | ITOM vs ITSM vs ITAM

What is IT operations management (ITOM)? IT operations management (ITOM) is a set of processes responsible for building, managing, and maintaining an organization’s IT infrastructure and is one of the main functions of Service Operation in the ITIL framework. Its related tasks revolve …

Read Story

What is IT change management? | The importance of the IT change management process

What is IT change management? | The importance of the IT change management process

What is IT change management? Change management, or change enablement, is the process that helps you to effectively implement any transitions or transformations you make in your organization’s IT environments, ensuring they’re carried out successfully and incidents or risks involved a …

Read Story

What is problem management? | Problem management explained and best practices

What is problem management? | Problem management explained and best practices

What is problem management? Problem management is a key ITSM process that identifies and resolves the underlying causes of incidents occurring in an IT service. By honing into the root cause, problem management aims to minimize the incidents that happen in the first place.

Read Story

ITSM HACK #4: 7 deadly sins of IT Governance

ITSM HACK #4: 7 deadly sins of IT Governance

Information technology permeates every aspect of the business, so leaving it unchecked can be detrimental to an organization’s success. This is where a proper IT governance (ITG) structure comes into play. Effective execution of an IT governance strategy not only ensures compliance an …

Read Story

ITSM HACK #3: 6 secrets for supercharging the IT help desk

ITSM HACK #3: 6 secrets for supercharging the IT help desk

The IT help desk plays an integral role in establishing ITSM best practices in the organization, as they act as the first point of contact to the IT department for the rest of the business. But with IT teams having to meet increasing demands with little resources, help desk teams also …

Read Story

ITSM HACK #2: 4 Tips for Driving Self-Service Adoption

ITSM HACK #2: 4 Tips for Driving Self-Service Adoption

So, you’ve just implemented a new self-service platform for your employees. But so far, it’s only been gathering dust as it remains unused. Whether it’s an HR portal or an IT ticketing system, how can you take advantage of these technologies when nobody’s using them?

Read Story

The beginning of an end-to-end service industry

The beginning of an end-to-end service industry

A successful business is always looking to enhance how it delivers services, both to its customers and workforce alike. But the past couple of years has reshaped how we work, drastically redefining expectations on what great service looks like. This has led to the need for organizatio …

Read Story

ITSM HACK #1: 5 Tips for remote IT onboarding

ITSM HACK #1: 5 Tips for remote IT onboarding

Good IT service management practice doesn’t just happen. It requires multiple trials and errors to get right and involves a thorough understanding of your people, processes, and technologies. In the following weeks, we’ll be sharing some great hacks to help optimize your ITSM processe …

Read Story

Key strategies for reducing service desk calls

key strategies for reducing service desk calls

The service desk plays an integral role in IT service management. It’s the single point of contact between the service provider and end-users, as defined by ITIL. Being a crucial part of IT processes, it’s therefore important that the service desk teams are working at their best. But …

Read Story

Subscribe by email