6 Tips for Creating a Mobile Hospital App Patients will Love
6 Tips for Creating a Mobile Hospital App Patients will Love 1024 726 InfoVision Admin

6 Tips for Creating a Mobile Hospital App Patients will Love

Are you looking to develop a mobile app for your hospital or health system or a mobile application developer looking to build a great app for a hospital client? Building a hospital app that patients love and will continue to use can be successfully done if you approach the app-building process the right way.

The hospital apps that currently exist tend to fall into three categories: marketing tools, internal tools (not for patients) and interactive. People don’t download hospital apps so they can get your marketing information (if they do, they probably won’t keep the app for long). According to a 2011 study by CPM Marketing Group, patients are looking for interactive hospital apps that offer solutions. Your app can still be an extension of the hospital’s brand but it should function more as a customer service tool.

Here are a few tips to help you create the next, great hospital mobile app.

1. Do your research. Ask your patients or potential future patients what they would like to see in a mobile app. Create a quick online survey available on your website or include a printed survey in your community newsletter.

2. Identify your solutions. What questions or problems does a patient have that you could help solve with an app? Here are a few solutions that have been incorporated into other great hospital apps:

  • ER Wait Times
  • Clinic Wait Time
  • Closest Facility
  • Facility Locator
  • Maps and Directions
  • Schedule an Appointment
  • Appointment Reminders
  • Medication Reminders
  • Physician Finder
  • Contact a Practitioner (email, phone or text)
  • News and Event Alerts
  • Imaging and Lab Results
  • Secure Location for Your Information (emergency contacts, medication, insurance, providers, allergies, etc.)

3. Be unique. Your hospital app should offer at least one thing that your main website does not offer. If your app can offer solutions that other hospital apps in your service area don’t provide, even better.

4. Consider being service line specific. You might want to consider developing one main hospital app and other apps that are specific to individual service lines. For example, if you have a fantastic diabetes management program, you could create an app exclusively dedicated to diabetes. If you want to focus attention on your pediatrics program consider an exclusive pediatrics app and include fast access to information on how to treat common childhood ailments, pre-office visit (poison ivy, dog bite, pink eye, mosquito bite, chicken pox, etc.) and a one-click link to the nearest poison control center.

5. Make it easy to use. If your app has too many hoops to jump through, people won’t continue using it. Try to keep clicks to a minimum whenever possible.

6. Go easy on health information. According to the same CPM Marketing Group study, health information ranked a distant third on survey respondents list of desires for a hospital mobile app. There are thousands of websites (including your hospital’s website) that are great places to research health conditions, and people prefer to use a laptop or tablet for research. People typically use their smartphones and mobile apps to simplify their lives, not to perform research.

If your hospital or health system is looking for hospital mobile application development, Infovision can help. We specialize in mobile business solutions and mobile app development for AndroidTM, iPhone, iPad and Blackberry platforms along with a host of other enterprise technology solutions.  Contact an Infovision representative for details.

Beyond IT: The Fascinating World of Computer Forensics
Beyond IT: The Fascinating World of Computer Forensics 1024 820 InfoVision Admin

Beyond IT: The Fascinating World of Computer Forensics

We’ve all heard the stories about how a ruthless murder plot is solved when detectives confiscate hard drives, search computer activities and untangle a web of cyber evidence leading to a diabolical killer. It’s the stuff intriguing movie plots are made of? But does it really happen that way? What is computer forensics anyway? Here’s a brief overview of how this emerging cyber sleuthing really goes down, according to tech writer Jonathan Strickland.

Fairly early on the legal system figured out that computer evidence would require unique processes and procedures for obtaining information and still protecting the rights of citizens. Detectives and computer scientists partnered to discuss what they would need to gather evidence from computers which eventually led to the field of study we’ve come to know as computer forensics.

Detectives typically have to get a warrant to search a suspects computer to obtain evidence. The warrant will include where detectives are allowed to search and what type of evidence they can search for. Detectives are not allowed to look any and every where they are suspicious about –the terms of the warrant can’t be too general, they need to be as specific as possible about the evidence they are seeking to gather. This means detectives have to do as much research as possible on the suspect before requesting a warrant. If a detective obtains a warrant to search as suspects laptop, but sees a desktop when he arrives at the suspect’s home, the detective will need to obtain specific permission to search that desktop.

While some computer  investigations can be executed quickly, others may take considerably longer. Factors that can impact how long it might take include the detectives level of experience, how many computers will be search, the amount of computer storage that must be searched, whether or not information was hidden or deleted, and any encrypted or password protected files.

And when it comes to how evidence is gathered, here’s what the movies leave out. Computer forensics expert Judd Robbins explains the steps detectives follow when gathering evidence from a computer:

–Secure the computer system to ensure that the equipment and data are safe. This means the detectives must make sure that no unauthorized individual can access the computers or storage devices involved in the search. If the computer system connects to the Internet, detectives must sever the connection.

–Find every file on the computer system, including files that are encrypted, protected by passwords, hidden or deleted, but not yet overwritten. Investigators should make a copy of all the files on the system. This includes files on the computer’s hard drive or in other storage devices. Since accessing a file can alter it, it’s important that investigators only work from copies of files while searching for evidence. The original system should remain preserved and intact.

–Recover as much deleted information as possible using applications that can detect and retrieve deleted data.

–Reveal the contents of all hidden files with programs designed to detect the presence of hidden data.

–Decrypt and access protected files.

–Analyze special areas of the computer’s disks, including parts that are normally inaccessible.

–Document every step of the procedure. It’s important for detectives to provide proof that their investigations preserved all the information on the computer system without changing or damaging it. Years can pass between an investigation and a trial, and without proper documentation, evidence may not be admissible. Robbins says that the documentation should include not only all the files and data recovered from the system, but also a report on the system’s physical layout and whether any files had encryption or were otherwise hidden.

–Be prepared to testify in court as an expert witness in computer forensics. Even when an investigation is complete, the detectives’ job may not be done. They may still need to provide testimony in court All of these steps are important, but the first step is critical. If investigators can’t prove that they secured the computer system, the evidence they find may not be admissible. It’s also a big job. In the early days of computing, the system might have included a PC and a few floppy disks. Today, it could include multiple computers, disks, thumb drives, external drives, peripherals and Web servers.

–Some criminals have found ways to make it even more difficult for investigators to find information on their systems. They use programs and applications known as anti-forensics. Detectives have to be aware of these programs and how to disable them if they want to access the information in computer systems.

[source Computer Forensics Basics]

As fascinating as these procedures are in their use to nab criminals, prosecutors must still be able to authenticate evidence in order for it to ever be introduced in a trial. Ultimately, prosecutors must be able to prove that the evidence came from the suspect’s computer and it hasn’t been altered in any way.

How Mobile Apps Give Small Business Owners a Leg Up
How Mobile Apps Give Small Business Owners a Leg Up 1024 680 InfoVision Admin

How Mobile Apps Give Small Business Owners a Leg Up

Some of the most popular mobile apps are those that help people run their lives more efficiently. For entrepreneurs, who often manage their businesses far away from a traditional office, there are an endless number of mobile apps now available to help them stay ahead of the competition, by either mobile phone or tablet. The mere fact that the entrepreneur doesn’t need to be sitting at a desk to manage his or her business can help save time and ultimately boost profits.

Check out these mobile apps for small businesses and entrepreneurs, arranged into categories.

Finance and Accounting

  • Keep your financial books in order with QuickBooks.
  • Accept payments with your smartphone and a plug-in card reader with Square.
  • View financial accounts, budgets and transaction history with Mint.
  • Store payment and loyalty cards and make payments using your smartphone with Google Wallet.
  • Track business expenses, mileage and scan receipts with Expensify.
  • Synch financial accounts and track cash flow with InDinero.
  • Manage timesheets, project plans and spreadsheets with Office Time.

Document and Asset Management

  • Store and share documents, images, videos and more with Dropbox.
  • Integrate Microsoft Office® documents, spreadsheets and PDFs without losing original formatting with Office to Go.
  • Organize, store, and share your text, images and voice notes with Evernote.
  • Import, edit and store most any type of file with Google Drive.
  • Store data and files, access information and manage permissions on the go with Box.
  • Fill out forms, record audio, take photos, get signatures and create high-quality CAD sketches with FormMobi.
  • Manage business and personal projects and events with Asana.


  • Send and receive voice calls, video calls and instant messages while organizing your contacts in one convenient spot with SkypeTM.
  • Set up, host and attend meetings with WebExTM.
  • Publish your company’s news, events and special offers to multiple online and social sites with LocalVox.
  • Share contact information, images and other files by bumping phones with another app user with the networking app Bump.
  • Manage appointments (schedule, reschedule, cancel) and automatically communicate changes to customers via email or text with Appointment Plus.

Customer Service

  • Track, evaluate and respond to customer service issues; communicate with customers through multiple channels (social, email, chat, phone, etc.); and keep customer contact information in one spot with Desk.
  • Connect customers to customer service reps, other customers and manufacturer reps with the feedback app Get Satisfaction MobileTM.


  • Track all of your trip arrangements (flights, rental car, hotel) and get weather, maps and directions at your travel destination with TripIt.
  • Avoid getting stuck in traffic with Waze.
  • Get maps, directions and more with Google Maps.

Prices, subscriptions and supported platforms vary from app to app so check your favorite app store for these gems and thousands of others. If you have a favorite app you use to manage your small business, we’d love to hear about it – please share yours in the comments section below.

If your business offers products and services for small business owners, think about how your solutions can be translated or enhanced and consider looking into mobile application development with Infovision. We specialize in mobile business solutions and mobile app development for AndroidTM, iPhone, iPad and Blackberry platforms along with a host of other enterprise technology solutions.

Malware 101: Part 1
Malware 101: Part 1 1000 750 InfoVision Admin

Malware 101: Part 1

Malware: A powerful word able to invoke fear in IT directors at its very mention  Malware has infected almost every corner of the Internet, and now mobile devices and social networks have been trapped in its vicious claw.  And the problem is not a small one. According to Symantec, in 2010 alone, 286 million different types of malware were responsible for more than 3 billion total attacks on computer users.  And the cost of malware for users is even more sobering. Some estimates suggest that cybercriminals using malware to steal personal financial information and other information cost the global economy as much as $1 trillion dollars per year. For businesses, that is an average cost of $3.8 million spent addressing, mitigating and restoring systems after a cyber attack. For individual customers, the numbers are estimated to work out to about $1000 in losses per attack.

What Is Malware?

Given its far-reaching and damaging effects, it’s important to understand exactly what malware is. Malware is software designed for the specific purpose of damaging, disabling, or disrupting computers,  computer systems, or networks. The bad guys, also known as hackers, will pounce on website security flaws, or vulnerabilities, to introduce malware into existing software and systems causing issues that can be as small as annoying pop-up windows or as significant as severe security breaches that give access to sensitive information and allow for major theft.

Malware is a term that encompasses a range of potential threats that include viruses, trojans, bots, worms, spyware and other malicious programs, however, each of these have their own unique way of wreaking havoc. Viruses replicate themselves and spread to other computers. Spyware takes information from a user’s system and sends it to hackers who can use the information to steal financial information.

How does malware work?

Malware can very easily infect websites. This is most commonly accomplished by injection and cross-site scripting. These methods allow user’s computer systems to be attacked by visiting a site. Sometimes referred to as “drive-by downloads”, users don’t have to actually download a bad file, the malware will take care of it on its own by taking advantage of compromised servers and developer desktops that are not secure. They often will affect web server PHP, HTML, and JavaScript files.

Most consumers don’t have the latest and greatest security software installed, or they may be using outdated browsers, plug-ins or other applications that may not be 100 percent secure. However, malware changes very rapidly so even the most current security systems with the most up-to-date patches may still be susceptible to malware attacks.

Moreover, with the spread of “packaged” attack software, which may also go by the name of exploit or command-and-control toolkits, now more than ever before hackers can develop malware that is faster, smarter and more damaging.

Website malware can include keystroke loggers, password harvesters, screen scrapers, and myriad other tools developed to infect a website visitor’s computer. When this happens, have inroads to take over a computer and cause significant and costly damage.

Malware 101: Part 2
Malware 101: Part 2 1024 683 InfoVision Admin

Malware 101: Part 2

Fighting off malware can be a huge headache for IT departments. They have to be vigilant in preventing and hunting down potential threats. Many of the tools commonly used to combat it are not created to get completely get rid of every single threat that’s out there. For example, anti-virus software may not be capable to detect worms or spyware. For business owners, even though computers may be protected by anti-virus software, those measures will not cover your business’ website.  And even if a major, credible web hosting service hosts your site, it may or may not offer vulnerability or anti-malware scanning to ensure that your web visitors don’t get infected. And though many of them provide anti-virus protection, they likely don’t protect against more sophisticated malware attacks. Be sure to find out for certain the type of security your hosting service offers to make sure you have the best protection available.

Top areas of vulnerabilities

Because Google indexes millions and millions of gigabytes of information on websites, its Google Safe Browsing feature produces an updated list of suspected phishing and malware pages. Sites that have malware can be blacklisted by Google or other watchdog sites. If your site is blacklisted, it is flagged such that when users try to visit your site through search results, a Google warning page instructs users to proceed at their own risk. There may be additional warnings pushed to users, but all serve as a red flag warning of potential danger.

According to Symantec, more than 40 percent of websites flagged by tools like Google Safe Browsing are eventually removed from the blacklist, getting taken off takes an average of 13 days. A quarter of blacklisted sites are never removed.

For web-based businesses this is bad news. If customers try to visit your site and warning pages pop up, then your site is automatically viewed as unsafe and chances are they will leave your site and quite possibly go to explore what your competition has to offer. And because it can take average of 13 days to be removed from the blacklist, you’re looking at potentially losing two full weeks of potential sales.

Moreover, this can also have a negative impact on your business’ reputation. Visitors could very well warn friends about problems with your site that can cause security issues. And with widespread use of social media platforms like Facebook, Twitter and LinkedIn word can easily spread uncontrollably. Consumers are not likely to investigate the issue with your site or whether there is a real danger, and chances are they won’t come back and visit your site again anytime soon.

Additionally, mobile devices can be targets for malware as well. Mobile applications are a fast-growing target malware attacks and social networks  can create strong malware transmission channels where users unknowingly  share and spread links to malware-infected websites. Users are much more familiar with email threats and are likely to avoid them, but they are much less familiar with the kinds of threats transmitted through social networks.  Social networks are fast becoming the intelligent and personalized cyber attacks.  And cloud computing, even with an in-depth security strategy, can make preventing website malware attacks difficult to prevent.

IT Security measures for cloud-based contact centers
IT Security measures for cloud-based contact centers 1024 686 InfoVision Admin

IT Security measures for cloud-based contact centers

For organizations that will establish or convert to cloud-based contact centers, a focus on security and privacy issues is a key component in the planning stages to ensure that there are no major security gaps and compliance requirements are in place. And for cloud-based contact centers availability and accessibility from the cloud is particularly crucial because employees need to be able to carry out their responsibilities with ease and without interruption so that business objectives can be met. Security threats can severely disrupt work and create major challenges for management. If credit cards are being processed through the contact center, there are quite possibly civil and criminal liabilities with any lapses in security.

To avoid these types of issues that can crop up with cloud-based contact centers, here are the top security concerns that IT should address:

  • Ensure that only authorized personnel have access to confidential information
  • Ensure the privacy of information like contact information, social security numbers, credit card information, call data, transcripts, etc.
  • Integration with third-party systems without compromising security and privacy

Contact center security categories:

  • Password-Based Authentication
  • Role-based security
  • Telecom security

Password-Based Authentication

Password-based authentication is important because it requires permission to access subscribed features. All passwords stored in the database should be encrypted and cryptographic algorithms should be in place to verify users. For repeated access attempts, alerts can be set up  and the user should be presented with further authentication.

Role-Based Security

Role-based security is a key aspect in protecting cloud-based contact centers. It can be set up to allow contact centers to give each user in their organization access to features and data based on their role within the organization. Cloud-based contact center security should allow for roles to be assigned to users in such a way that access is defined and constrained to prevent any unauthorized access.

Different roles and authorities can be designated to users so that each person can access the features and data needed to complete their work. Allowances can be determined at read, write, update and delete levels for all data. Restriction levels in terms of skills, teams and projects can also be set. An agent, depending on their role, may be able to see customer details, but unable to update, edit or delete them. Supervisors may be able to view the performance of a team member or his or her entire team, but unable to see the performance of a team in a different department.

Telecom Security

License owners should have the authority to prohibit CSRs from making calls or texts that have not been authorized to unauthorized calling areas. Telecom security measures should also prohibit outbound users while at the same time allow them to make user initiated calls or texts to assigned calling areas to avoid international calling charges. If necessary, it should also prevent inbound license owners from receiving calls from certain calling areas.

Best practices for Healthcare IT Hiring
Best practices for Healthcare IT Hiring 1024 680 InfoVision Admin

Best practices for Healthcare IT Hiring

IT recruiting in the healthcare industry, particularly in hospitals, can be challenging to HR recruiters for a number of reasons. Hospitals are somewhat at a disadvantage because qualified candidates may perceive the healthcare field as woefully lagging behind in technology programs and providers haven’t done a great job at presenting themselves as modern and progressive. Furthermore, there’s a shortage of IT people skilled in the area of optimizing electronic health records and other healthcare systems. However, there are a number of best practices that when put in place can help improve the hiring of good IT employees for hospitals to support the rapid changes in healthcare technology.

Know your high-risk areas

In an effort to minimize turnover, facilities can take a proactive approach to assessing and identifying the areas that are at a greater risk of having a shortage in talent. Employees are more likely to leave from these high-risk areas for three reasons 1. Their particular area of expertise is in great demand 2. Their salaries are not on par with peers or industry standards, and/or 3. The organization is not performing well. Once this assessment has been completed, hospitals will be able to prioritize the positions to be filled and gaps and develop measures to combat frequent departures.

Write compelling job descriptions

Hospital IT department job descriptions should include compelling details that attract strong candidates like relevant industry-focused job titles, well-worded and attractive descriptions of the job’s responsibilities, an overview of the culture of the hospital, as well as perks such as being able to work remotely, casual dress or flexible work schedules. By writing creative, inspiring job postings you’re more likely to pique the interest of good, potential candidates who may have several job options to consider.

Communicate IT hiring goals 

It’s also important to make sure that the HR department understand the hiring goals of the IT department. Communicate to the candidate’s initial point of contact what the hospital’s resource management objectives are, what the hiring priorities are, and inform them about how processes should be handled like how the interview will be conducted. They should know the specific qualifications that the IT department is seeking in the candidate. This will ensure that HR and IT are on the same page, which will prevent delays that may cause you to lose solid candidates.

Know your competition

Pay attention to other organizations who have similar openings and may be looking to recruit your talent away from you. Track industry recruiter activities in your region and get out in front of messaging that would suggest to your team that the grass is greener elsewhere.


Also consider hiring a third-party to support and serve as an extension to your IT staff.  Infovision’s team of IT experts can provide you with in-depth knowledge, experience, services and talent that bring valuable perspective, best practices and experience that will keep IT projects on track and on budget.

Top Ways IT Departments Can Leverage Video
Top Ways IT Departments Can Leverage Video 1024 681 InfoVision Admin

Top Ways IT Departments Can Leverage Video

The use of video is increasingly growing in popularity as a key element of marketing strategies to reach consumers, the medium is also gaining traction in the world of IT departments. From attracting new customers, to boosting recruiting efforts, to employee training programs — video can be a powerful and effective tool for IT departments for a number of reasons. And because video technology is likely already included in your IT toolset, having the resources to leverage video should be fairly accessible to most IT teams. If your IT program has not yet adopted video into your practice, here are several ways you can begin to leverage the technology:

Use video to attract new customers

Explanatory video can be used on your home page if your service or product is innovative or requires more detailed explanations for new customers to understand. You can also use video to set yourself apart from your competition by explaining how your products or services are different and better.

Use video to make product or service announcements

Video is a also a great way to get the word out and build buzz around a new product or service. It helps your organization rise above the noise level of all the other product announcements and directs viewers to your website, creating value and traffic.

Use video to boost your recruiting efforts

Because finding and recruiting the top talent is a crucial function of most IT departments, creating videos that feature company employees and that promote the company’s culture and career growth opportunities can be very influential as a recruiting tool.

Use video to educate customers

Video is also an excellent tool for product or service demonstrations because they can convey more ”how-to” information faster than using photos, illustrations or written descriptions. They can also be used as a marketing tool to put a more personal face on your company.

Use video to educate and train employees

Video can be used as a great tool to reach employees as well.  You can use them as a teaching tool and reach many people at once. It alleviates operational issues associated with one-on-one training and ensures consistent messaging.  People are visual and video can be much more engaging than reading instructional or employee manuals.

Use video to share positive customer experiences

Another great use of video is for customer testimonials. They help add credibility and validate your business. Additionally, customer testimonial videos can help build positive buzz and social proof of why your company is a good choice. Satisfied customers touting how your company was able to help them meet business objectives, and how they will continue to use and recommend your services also builds trust.

Share Best Practices

Live and recorded video can also be used to create communities for clients, vendors and ssuppliers to come together and learn industry information and best practices. This medium is convenient as well as time and cost saving because it can be distributed easily and reach broad audiences at once.

Leadership Skills CIOs Must Possess
Leadership Skills CIOs Must Possess 1024 683 InfoVision Admin

Leadership Skills CIOs Must Possess

The most successful CEOs will differ in personality and as well as the areas of leadership in which they excel. The will differ in their approach to business as well as in character traits. However, there are few leadership skills that are fairly consistent across the board when it comes to CIOs, and no matter what your leadership style ultimately be, these skills are fundamental to your success in the role of CIO.


An authentic spirit is important for CIOs and all leaders to possess. He or she should work to lead their department in a way that is truly reflective of personal values, integrity and character. False personas are easily detected and will degrade the integrity of the organization’s work and endeavors.

Strategist and Visionary

Good leaders have vision and they also are able to develop a strategy to bring that vision to fruition. The CIO’s role may include communicating down the organizational goals from the top. A CIO with solid leadership skills is able to deliver the information such that it is accepted by the team and inspires them to buy-in. The communication is rooted in a strong understanding of the business and communicating it so that it’s clear to stakeholders who will help provide direction, funding and/or authority to execute the strategy and thus benefiting the organization as a whole.

As a strategist,  the CIO should understand the environment and playing field and be able to develop a plan to leverage identified opportunities. When the CIO is in charge of an organization that relies heavily on the IT department, the CIO should stand out as a solid strategist and visionary who is also a trusted partner at the top levels of the organization.

Mentor and Talent Scout

A CIO should also serve as knowledgeable and wise mentor, not only for the IT department, but for the organization as a whole. It’s helpful to have an engaging personality supported by  strong sense of purpose, direction, guidance and motivation that inspires fresh, creative thought and spurs employees to take action. The CIO should inspire his or her team to creativity, enthusiasm, and energy.

Change Agent

Many times the CIO is a senior level executive and may even be a board member, thusly, he/she needs to have a thorough, 360 degree understanding of business, be able to lead key projects that support business objectives, as well as drive the change in the organization.  He or she should also be entrepreneurial and able to move the company in a direction that will enable new heights to be reached.

Agile, yet Methodical

CIOs shouldn’t be afraid in dynamic situations, but rather be a constant learner that is agile and and able to easily adapt. It’s common for IT leaders to be equipped to handle the complexities of both business and technology, all while engaging staff in innovative conversations that yield fresh ideas, and be able to manage them toward business results.

Tips for Switching Industries as a CIO
Tips for Switching Industries as a CIO 1024 683 InfoVision Admin

Tips for Switching Industries as a CIO

For many CIO’s a job search can evoke feelings of trepidation because of the belief that if you want to switch industries the cards are stacked against you. Old school thinking may have suggested that IT leadership roles transferred across industries and searches did not have to be limited to candidates within the same industry. Now, however, there is a tendency toward specialized backgrounds that can limit to some extent how well of a fit you’re perceived as being for a particular organization.

To that point, as IT recruiter Martha Heller points out, CIOs switch industries all the time. She points to the example of Dave Smoley leaving Flextronics to become CIO of AstraZeneca, and Oliver Bussman moving from financial services to SAP. Even still, Heller says that an increasing number of her clients are looking for CIOs who have spent several years in their own industry.

But what if you’re a CIO that’s sick and tired of your own industry and you’re serious about making a move to another industry? Here are few ways to think about your approach to your job search that may help you sidestep preferred qualifications and move into a new area of IT.

Concentrate your search on late adopters

If you’ve recently spearheaded a project that involved a major rollout of BYOD on transferring to cloud-based operations, then look for companies outside of your industry that may have plans to do something similar in the future.  In this case, they may see more value in your recent experience leading projects that they have coming down the pike than your lack of expertise in their particular industry.

Talk to vendors about the industries with which they partner

Find out from your vendors about opportunities in the industries they work with. For example, if you have significant experience in deploying mobile applications for enterprise, find out from your mobility vendors about new industries they are looking to expand within and follow suit in your job search efforts.

Build bridges/Find or create similarities

If you’re a CIO in the healthcare field and you’re looking to move to financial services, it may be a good idea to transition into health insurance, before seeking out a position in financial services. It requires less of a jump in the minds of those who will be evaluating your qualifications. And consider the fact that although retail, food service and travel may be quite different, they are all consumer-focused. Emphasize your consumer background, as you work to make the leap between consumer-focused industries. But remember that if you’re a hospital CIO who wants to work in banking, you’re making a big leap. You might be better off joining a health insurance company for a few years first, and then make the more subtle move from insurance to banking.

Consider taking on pro bono work

If you have the time, another tactic is to consider doing pro bono work for a charitable organization, foundation, associations, or trade group within the industry to which you’d like to transition. Taking on these types of projects will help you build relationships within the industry and gain helpful knowledge that will make you a more attractive candidate.

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Here you can change your Privacy preferences. It is worth noting that blocking some types of cookies may impact your experience on our website and the services we are able to offer.

Our website uses cookies, mainly from 3rd party services. Define your Privacy Preferences and/or agree to our use of cookies.