Change Control – Freezes & Risk Evaluation Policy

The purpose of this policy is to ensure that IT staff recognize that changes to computer systems tend to destabilize those systems.

Request for Change Form

The creation of a request for change (RFC) form for the enterprise can be a time consuming and daunting task. Save time by customizing this form to the context of your...

Project Milestones Report Template

The beginning stages of the project are dedicated to working out the details of the project task schedule. Take advantage of this template to determine and create a...

Storyboard: Focus on Project Management Essentials

Successful project completion is on everyone's wish list. Understand the four essentials of successful project management and adopt simple tools that will help organize...

Merger & Acquisition Project Planning and Monitoring Tool

92% of IT professionals who achieve their merger and acquisition (M&A) goals create an M&A plan with specific timelines outlined for application, infrastructure, data,...

Anti-Virus Policy

The anti-virus policy provides a computing network that is virus-free; this policy provides instructions on measures that must be taken by company employees to help...

The Goal of IT/Business Alignment: Why so Elusive?

Has the ideal of IT/business alignment become the holy grail of IT leaders? The promise of IT/business alignment is to focus investment and activities, increase the value...

Avoid Project Management Pitfalls

To achieve greater likelihood that your project will stay on track, watch out for the four big pitfalls: scope creep, failure to obtain stakeholder commitment, inability...

Quality IT Communication with Stakeholders is Key to Success

It is essential for all CIOs to maintain quality communication with core business stakeholders in order to build strong relationships and establish trust. Consistent...

Telephone and Voicemail Acceptable Use Policy

Telephone and voicemail services are crucial and versatile communication tools for any business. However, they also run the risk of being repurposed for personal calls...
GET HELP Contact Us
×
VL Methodology