Business Technology Insights from Wylie Blanchard - Business Technology Analyst and Speaker - Chicago Illinois https://wylieblanchard.com/blog/ Wylie Blanchard | Business Technology Expert, Digital Executive Advisor & Speaker - Wylie Blanchard Mon, 08 Sep 2025 01:59:56 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 /wp-content/uploads/cropped-Wylie-Blanchard-profile-photo_202008_IMG_7092_1100x1100-32x32.jpg Business Technology Insights from Wylie Blanchard - Business Technology Analyst and Speaker - Chicago Illinois https://wylieblanchard.com/blog/ 32 32 The Five Minute Lag that Cost Dollars https://wylieblanchard.com/the-five-minute-lag-that-cost-dollars/ Mon, 08 Sep 2025 09:27:00 +0000 https://www.wylieblanchard.com/?p=9149 A 5-minute freeze pushed a clinic’s procedure off schedule—small stalls, big losses. Hidden downtime bleeds revenue daily. The stopwatch test shows you...

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Concerned woman sitting at desk with laptop

Ever yell at a spinning blue wheel during crunch time?

Last Tuesday it froze a clinic’s operations for five minutes..

Five minutes—yet enough to push a planned procedure off the schedule.

Stalls like this can added up to $,$$$,$$$’s your business will never see.

Tiny lags hide inside every workflow.

They don’t reach the outage log, but they bleed revenue and morale.

I carry a stopwatch for moments like this.

Try it today.

Pick one high-stakes task, hit start, and mark every “pause” you spot.

Multiply that idle time by your average dollars per minute.

If the math feels painful, here’s a free Downtime Calculator that can do it for you.

What’s the most expensive pause you’ve caught in your organization?


This content was originally posted on Linkedin.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
9149
Bucket-List Leap, Tech-List Wins https://wylieblanchard.com/bucket-list-leap-tech-list-wins/ Fri, 05 Sep 2025 21:15:49 +0000 https://www.wylieblanchard.com/?p=9133 Stepping out of a plane taught me fear fades when you trust the checklist. The same goes for your tech bucket list—legacy systems, automation, drills...

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Wylie and instructor gearing up to skydive
Wylie and instructor on plane preparing to skydive
Wylie and instructor skydiving
Wylie and instructor skydiving
Wylie and instructor skydiving
Wylie and instructor after skydiving

Over the weekend I crossed “skydive” off my personal bucket list.

The split second before I stepped out of the plane was a rush of what-ifs—until the harness check, altimeter tap, and nod from my instructor turned anxiousness into purpose.

45 seconds of free-fall, plus several minutes of glide time later, and I was grinning on solid ground, wondering why I’d waited so long.

We all keep a quieter bucket list at work:

  • the legacy system we keep meaning to retire,
  • the data feed we’re nervous to automate,
  • the cybersecurity drill we never quite schedule.

Each feels like leaping into thin air—until we break it into clear steps and trust our gear.

Choose one item on your technology bucket list today. Write down the first three actions and a deadline for each.

Fear fades fast when the unknown has a checklist.

Need help deciding which leap earns top spot?

Grab my one-page Modernization Scorecard—leave your email and I’ll send the worksheet (plus one bite-size tech tip each week, unsubscribe anytime). https://lnkd.in/gS2yVMZ8

Which legacy project shoots to the top when you score capacity, risk, and timeline?


This content was originally posted on Linkedin.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
9133
What a 45-day steak can teach us about go-live dates https://wylieblanchard.com/what-a-45-day-steak-can-teach-us-about-go-live-dates/ Fri, 29 Aug 2025 20:44:16 +0000 https://www.wylieblanchard.com/?p=9116 Some flavors can’t be rushed—whether in steak or digital transformation. The real value emerges only after time, trust, and refinement...

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Wylie and his wife
Cooked steak on a plate
Cooked steak and lobster on plate
Image of steaks in dry ager

Forty-five days ago those steaks looked just like every other cut in the cooler. Enzymes, time, and steady airflow did their quiet work until the moment you see in swipes 2 and 3. Last night we tasted the payoff while celebrating my wife’s birthday—and it reminded me why some upgrades in healthcare IT should be treated more like dry-aging than fast-food.

I meet leaders who pull go-live dates forward because “the board wants quick wins.” Yet the richest value—seamless hand-offs, clinician trust, measurable equity gains—only shows up after a workflow has time to breathe, refine and mature.

If you are weighing a rushed release against an extra cycle of user testing, consider the steak. Flavor compounds aren’t built in an afternoon, and neither is lasting digital transformation.

Quick exercise: grab one live initiative and ask, “What could an extra 30 days of purposeful aging unlock—risk mitigated, adoption lifted, data validated?” The difference may taste a lot like that first bite of rib-eye.

In the comments I’ve linked the blank CRT Worksheet I use to score Capacity, Risk and Timeline. Download it, run your numbers and see if your project needs extra aging.

Which project in your organization would benefit most from an intentional pause and refinement?


This content was originally posted on Linkedin.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
9116
Four cover drafts, one clear mission—modernize without downtime https://wylieblanchard.com/four-cover-drafts-one-clear-mission-modernize-without-downtime/ Sat, 23 Aug 2025 19:34:07 +0000 https://www.wylieblanchard.com/?p=9104 Modernizing without downtime isn’t just design—it’s survival. One CFO’s 17-minute freeze cost $28K and delayed care. The CARE Framework shows how to...

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Laptop displaying four cover drafts of book ‘Zero-Downtime Care’.

Yesterday a Chicagoland CFO sent an SOS:
“Our interface froze for 17 minutes—delayed care and $28K in overtime.”

In the manuscript I’m polishing, we tackle moments like this with the CARE Modernization™ Framework:

  1. CLARIFY the real-world stakes (patients, revenue, reputation)
  2. ALIGN every leader on a downtime-proof roadmap
  3. REGULATE early—security, compliance, funding in one loop
  4. ENGAGE teams to deliver upgrades without disruption

Each cover draft reminds me the real “cover” we need is a resilient tech backbone—so clinicians focus on care, not spinning hourglasses or “system unavailable” banners.

Skim the 2-page overview (PDF) — low-commitment read
Join the launch team — early preorder links & share graphics

Thanks for following the journey. Let’s turn downtime stories into uptime victories together.


This content was originally posted on Linkedin.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
9104
From 5% time-cap to finished title—here’s my book creation journey in 30 seconds https://wylieblanchard.com/from-5-time-cap-to-finished-title-heres-my-book-creation-journey-in-30-seconds/ Fri, 22 Aug 2025 19:27:47 +0000 https://www.wylieblanchard.com/?p=9096 From 5% time-cap to finished title: Zero-Downtime Care. A playbook to turn hidden IT threats into growth momentum. Here’s what you’ll master...

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Wylie's Book title reveal: Zero-Downtime Care

A plain-English playbook for Providers, Payers & Population-Health Leaders to secure and scale IT.

Why it matters

  1. Silence hidden tech threats draining budgets & morale
  2. Turn downtime into growth time with the CARE Modernization™ Framework
  3. Lead with confidence—no coding required

What you’ll master

  • Clarify the Wins 
  • Align the Teams 
  • Regulate as You Build 
  • Engage for Lift-Off

Grab the 2-page overview (PDF) – low-commitment skim
Join the launch team – early preorder links + share-graphics

Huge thanks to every colleague who offered feedback, tools, or cheer-squad energy—you made this milestone possible. If you know someone wrestling with outdated tech, tag them below and let’s turn hidden threats into mission momentum together!


This content was originally posted on Linkedin.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
9096
Cyber‐risk isn’t an IT problem – it’s a business problem. https://wylieblanchard.com/cyber%e2%80%90risk-isnt-an-it-problem-its-a-business-problem/ Sun, 22 Jun 2025 18:51:09 +0000 https://www.wylieblanchard.com/?p=9083 Cyber-risk isn’t just IT—it’s business survival. Lumma Stealer’s takedown shows how fast crime adapts. The real question for leaders is whether we...

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Lumma Stealer: Our criminal operations is now out of business

Recently, the FBI, Microsoft, and global law-enforcement partners pulled the plug on Lumma Stealer—the most widely used “info-stealer-as-a-service” on the dark web. The takedown removed 2,300+ malicious domains and shuttered the control panels criminals used to sell stolen logins and crypto-wallet keys.

Why does this matter to boards and P&L owners?

  1. Credentials are today’s crown jewels. Lumma was linked to at least 1.7 million successful breaches—the prelude to ransomware, wire-fraud, and IP theft. 
  2. Cybercrime is now “productized.” For as little as $250 a month, any bad actor could rent Lumma like Salesforce. That subscription model collapses the barrier to entry and multiplies the number of attackers. 
  3. Takedowns buy time, not immunity. History shows that criminal crews rebrand or rebuild within weeks. The question isn’t if they return—but whether we use the pause to raise our defenses.

Executive next steps:

  • Demand multifactor authentication everywhere. One-time codes or passkeys stop credential replay cold.
  • Ask for a “privileged-access” map. Finance systems, email and backups should be behind extra checks.
  • Test incident response quarterly. If a fake invoice lands tomorrow, who pulls the plug and who calls legal?
  • Budget for continuous discovery. Ensure IT can see every SaaS account, shadow server, and remote worker.

Suggest reading: Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer – Microsoft

Cybersecurity is ultimately a business resilience investment. Use the Lumma takedown as a boardroom moment: applaud the good news—then fund the controls that keep it that way.


This content was originally posted on Linkedin.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
9083
Illinois Privacy Compliance: What Every Business Owner Needs to Know https://wylieblanchard.com/illinois-privacy-compliance-what-every-business-owner-needs-to-know/ Sun, 01 Jun 2025 08:26:00 +0000 https://www.wylieblanchard.com/?p=8974 Illinois has some of the toughest privacy laws in the U.S. A missed consent form or weak policy could cost millions. Here’s what every business owner needs to...

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Silhouette of the state of Illinois with digital icons

The Rising Stakes of Data Privacy.

Whether you’re running a family-owned retail shop, growing a medical practice, or managing multiple office locations, if you handle customer or employee data, privacy compliance applies to you.

In Illinois, two of the strictest privacy laws in the country—the Biometric Information Privacy Act (BIPA) and the Personal Information Protection Act (PIPA)—create clear legal obligations that can cost thousands (or millions) if ignored.

As an IT consultant who works with small and midsize businesses across the state, I’m here to break down what you need to know and how you can protect your business before problems arise.

Understanding Key Illinois Privacy Laws

Biometric Information Privacy Act (BIPA)

BIPA regulates how private businesses collect, use, and store biometric data like fingerprints, facial scans, and retina scans. It requires:

  • Informed written consent before collecting or storing biometric data.
  • Disclosure of the specific purpose and storage duration.
  • public retention and destruction policy.
  • A strict prohibition on selling or profiting from biometric data.
  • Private right of action, meaning individuals can sue your business for violations.

Even something as common as a fingerprint time clock or facial recognition camera falls under BIPA. Penalties and fines can be applied for violations of negligence, recklessness or intentional action.

Personal Information Protection Act (PIPA)

PIPA focuses on safeguarding broader categories of personal data, including Social Security numbers, driver’s license numbers, medical and health insurance information, account numbers, and login credentials.

It requires:

  • Prompt breach notification to affected Illinois residents.
  • Reporting breaches to the Illinois Attorney General (if 500+ individuals are impacted).
  • Reasonable security measures to protect data.
  • Proper disposal of sensitive data.
  • Contracts with third parties that require them to maintain security.

Violations are considered unlawful practices under the state’s Consumer Fraud Act and can result in enforcement actions.

Common Compliance Pitfalls

Despite the legal requirements, many businesses unintentionally fall short. Here are some of the most common missteps:

  • Using biometric time clocks without proper notice or consent.
  • Collecting customer or employee data without a written policy or retention schedule.
  • Failing to implement encryption, firewalls, or access controls.
  • Assuming that cloud storage providers automatically ensure compliance.
  • Not having an incident response plan or breach notification process.

Often, the biggest risk comes not from bad intentions but from lack of awareness.

Steps Toward Compliance: IT Consultant’s Checklist

Here is a practical checklist to help your business align with Illinois privacy laws:

  1. Audit Your Data: Know what types of personal and biometric data you collect, where it’s stored, who has access, and how long you keep it.
  2. Create a Written Privacy Policy: Include clear language about data collection, usage, retention, and destruction.
  3. Implement Consent Procedures: Obtain written consent before collecting biometric data and explain how it will be used.
  4. Secure Your Systems: Use encryption, secure user authentication, regular patching, and monitoring to protect stored data.
  5. Train Your Employees: Ensure your staff understands data privacy procedures and how to respond to data incidents.
  6. Plan for Breaches: Develop and test an incident response plan, including breach notification protocols.
  7. Review Vendor Contracts: Make sure service providers who access your data agree to meet your security requirements.

The Cost of Non-Compliance

Non-compliance isn’t just a legal problem—it can be a business-ending event. Illinois courts have upheld massive BIPA settlements, with some cases costing businesses millions in damages. A single fingerprint scan collected without consent can lead to multiple violations, each carrying its own penalty.

With PIPA, a data breach could force you to notify thousands of customers, face scrutiny from the Attorney General, and deal with damaged customer trust.

Tools and Tech That Can Help

Fortunately, the right tools can make compliance manageable:

  • Consent management platforms to track and store written consents.
  • Data loss prevention (DLP) software to monitor sensitive information.
  • Security information and event management (SIEM) tools for real-time alerts.
  • Encryption solutions for both stored and transmitted data.
  • Automated backups with secure, offsite storage.

Don’t overlook free or low-cost training platforms to keep your team informed.

Make Privacy a Business Priority

Privacy compliance isn’t a one-time fix—it’s an ongoing responsibility. If you collect any form of personal or biometric data, you are legally and ethically responsible for protecting it.

By investing in secure systems, clear policies, and proper staff training, you’re not just avoiding fines—you’re building customer trust and long-term resilience.

If you’re unsure where to start or whether your current practices meet Illinois standards, now is the time to act.

Local IT consultants, privacy professionals can help you:

  • Audit your systems and data handling practices
  • Develop legally sound policies and consent forms
  • Deploy the right technologies for security and monitoring
  • Train your team to maintain compliance

Don’t wait until a lawsuit or a breach that forces your hand. Reach out to a trusted local technology expert today and take control of your privacy compliance strategy.


This content was originally posted on Medium

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8974
This April fools joke is on me https://wylieblanchard.com/this-april-fools-joke-is-on-me/ Thu, 01 May 2025 09:55:00 +0000 https://www.wylieblanchard.com/?p=9191 April Fools on me: my wife “published” my fake book with Excel parenting hacks. Funny gift, serious reminder to finish the real one. Here’s where I am now...

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Image of Wylie on a book titled 'Techno-Parenting with a Smile'. Other image text: A FUN MILESTONE IN MY BOOK WRITING JOURNEY_Could this be my first book

As I work toward publishing my first book this year, I recently hit an unexpected (and hilarious) milestone—thanks to my wife. She surprised me with a custom-made book titled “Techno-Parenting with a Smile: Managing a Family of Four with Excel Spreadsheets and Advanced Algorithms”, with me listed as the author. It was a lighthearted gift from Book by Anyone, and while purely for laughs, it came with a challenge: “Here’s your first published book—now keep writing the real one!”

That playful moment reminded me why I started this journey in the first place—and gave me a renewed sense of motivation.

Here’s where I am now:
– New Focus: I’ve set aside my earlier book drafts to focus on a new book idea.
– The Topic: A practical guide for non-technical leaders looking to modernize their tech without breaking the bank.

Thanks for following along—I’m excited to keep you updated. Got tips or experiences to share? I’d love to hear them.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
9191
The Scammers Almost Got Me https://wylieblanchard.com/the-scammers-almost-got-me/ Sat, 26 Apr 2025 08:53:00 +0000 https://www.wylieblanchard.com/?p=8964 They almost got me. A week ago, we filed a new trademark application. Yesterday morning, we got an email. Looked official. Said a few items were missing from the application.Said we needed to send info to the USPTO. All day, I was thinking about that email. Telling myself, get the info together. Don’t want to […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Laptop computer displaying an email message. in the background Alarm bell ringing in foreground. Image text: Phishing Attempt

They almost got me.

A week ago, we filed a new trademark application.
Yesterday morning, we got an email.
Looked official.
Said a few items were missing from the application.
Said we needed to send info to the USPTO.

All day, I was thinking about that email.
Telling myself, get the info together.
Don’t want to mess up the process.
Don’t want our application rejected.

Last night, I looked at the email again.
Something felt off.
Email address? Looked funny.
Didn’t have the right domain.
No links. No instructions.
Just the USPTO logo. That’s it.

So I went straight to USPTO.gov.
Logged in. Checked the application.
Nothing missing. No errors.
Everything looked fine.

Then I found the real email from USPTO when I first applied.
It said—watch out for scams.
Said all emails would come from USPTO.gov.

That email I got yesterday morning?
Didn’t have that domain.
Scam.

Took it a step further.
Used WHO.IS to check the sender’s domain.
Domain was created yesterday.
Classic scam move.

They almost got me.
But not in this attempt.

If I had been rushing yesterday morning…
If I had replied with info…
I would’ve given them sensitive details about me and our business.
Worse—I would’ve shown them I’m willing to communicate.

They could’ve kept emailing us.
Asking for more.
And I might’ve sent it.

So—watch those email addresses.
Check the content.
Don’t rush.


This content was originally posted on Medium

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8964
The Balance Between DIY and Professional Tech Support https://wylieblanchard.com/the-balance-between-diy-and-professional-tech-support/ Mon, 24 Feb 2025 03:43:53 +0000 https://www.wylieblanchard.com/?p=8929 How do you balance empowering employees to create technology solutions while maintaining IT oversight and governance? There’s a growing trend among business decision-makers who are stepping into “citizen developer” roles, using low-code or no-code platforms like Microsoft Power Apps or Power Automate. By leveraging their unique insights into everyday business challenges, these individuals are creating […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
How do you balance empowering employees to create technology solutions while maintaining IT oversight and governance?

Puzzle pieces connecting DIY Innovation to key business concerns

There’s a growing trend among business decision-makers who are stepping into “citizen developer” roles, using low-code or no-code platforms like Microsoft Power Apps or Power Automate. By leveraging their unique insights into everyday business challenges, these individuals are creating quick, innovative solutions without relying solely on traditional IT teams. The results can be transformative—enabling faster deployment, immediate value, and better alignment with specific organizational needs.


When Enthusiasm Meets Initiative

Embracing a do-it-yourself (DIY) mindset in technology can unlock fresh ideas and jumpstart operational improvements. Here’s why the non-traditional development approach can be so powerful:

  1. Empowerment and Growth
    • Business professionals gain technical confidence and new skills. This can lead to deeper engagement and an inventive culture that encourages continuous improvement.
  2. Rapid Prototyping
    • Low-code/no-code tools allow for immediate experimentation. Teams can quickly roll out prototypes to see what works, gather feedback, and iterate toward a more refined solution.
  3. Cost-Efficiency (Within Reason)
    • Early projects can often be handled with minimal investment, freeing up budget for more complex endeavors or resources that require specialized expertise.
  4. Team Morale
    • Celebrating internally developed solutions can energize an entire department, fostering a sense of ownership and collective pride.

Knowing When to Involve Experts

Even the most driven DIYer can encounter scenarios where professional IT support makes all the difference. Here are some key indicators:

  1. Advanced Security & Compliance
    • Certain projects, especially those involving sensitive data or regulatory obligations, require specialized oversight to minimize risks and ensure proper safeguards.
  2. Integration with Existing Systems
    • Solutions often need to communicate with CRMs, HR systems, or other enterprise platforms. Professional IT can guarantee seamless connections and data flow.
  3. High-Volume Scalability
    • A DIY prototype might work for a small team. However, scaling up can expose performance bottlenecks, architecture issues, or unmet infrastructure needs.
  4. Complex Troubleshooting
    • Hidden complexities or advanced workflows may demand deeper technical skills. IT experts can root out potential problems quickly and permanently.
  5. Future Maintenance & Enhancements
    • Low-code platforms regularly introduce new features and updates. An IT team can help ensure your solution stays aligned with platform changes, security patches, and emerging best practices.

From Collaboration to Cohesion

While citizen developers excel at rapidly bringing ideas to life, collaborating with IT—whether an internal department or an external provider—adds a layer of robustness and future-proofing. By blending each group’s strengths, you can:

  • Refine Architecture – Confirm that the solution’s underlying structure is efficient, reliable, and easy to expand.
  • Verify Security & Compliance – Meet relevant regulations, protect sensitive information, and avoid vulnerabilities.
  • Plan for Growth – Ensure the solution can scale alongside evolving business needs and frequent platform updates.

This balanced approach preserves the agility of citizen development while reinforcing it with specialized expertise for long-term success.


Citizen development represents a powerful shift, allowing business professionals to solve problems with tools that were once accessible only to seasoned developers. It can lead to faster innovation, reduced costs, and heightened ownership. However, it’s also important to know where the limits lie and when to bring in professional support to handle complexities and future-proof solutions.

If you’re exploring your own DIY initiatives or considering how best to maintain them in the long run, connecting with experienced IT professionals—whether internally or externally—can help ensure that you’re building secure, scalable, and sustainable solutions.


This content was originally posted on Medium

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8929