shutterstock 520407727

Using AI and intelligent software to identify and prevent contract risk

Any contract – no matter how favourable the terms may seem – can bring risk as well as opportunity. To secure your enterprise, your team and your reputation, it’s important
Posted  on February 28, 2019
Biggest tech mistakes 2018

Biggest tech mistakes 2018

Four lessons for your business from 2018’s tech scandals 2018 was a difficult year for tech companies. From the fallout Facebook faced in the Cambridge Analytica disaster to Elon Musk’s
Posted  on February 5, 2019
hacker 1944688 1280

Cyber security: are your contracts safe?

Cyber security is a hot topic these days. But it hasn’t always been that way. Many contract management professionals will admit that, for a long time, cyber attack was way down
Posted  on July 10, 2018
shutterstock 689788498 1V2

Cyber warfare 2019

Trends, opportunities and threats A constant state of war Guess what? The risks from malware, data breach and other cyber attacks are here to stay. It’s a sobering thought to
Posted  on March 13, 2019
risk control strategies

Data protection strategies to minimise risk

Data protection is a priority in any business. Developing risk control strategies to minimise and control risk is an essential aspect of responsible business management. The following framework will help
Posted  on March 23, 2020
31 How to keep your data safe while travelling

How to keep your data safe while travelling

Despite the rise of easy video conferencing, there are times in business when only face-to-face meetings will do. But when you’re travelling on business, you still need access to your
Posted  on February 11, 2019
33 How to securely store contracts in the cloud

How to securely store contracts in the cloud

These days, data protection (UK) or data privacy (US) is so important it even has its own day. January 28th, I’ve only just found out about it or you’d have
Posted  on February 6, 2019
shutterstock 725782942

Implement two-factor authentication in your business

Weak passwords are a reality in both business and personal life. Password exploits are the preferred method for hackers to breach both corporate and private systems today, with thousands of
Posted  on February 13, 2019
Why you should be implementing two factor authentication in your business 1

Why you should implement two factor authentication in your business

Two-factor authentication (or, more generally, multi-factor authentication) is a method of validating the identity of a user, as part of an access control process, which requires more than one identifying
Posted  on May 16, 2019

How to secure Remote Desktop

With remote working becoming increasingly popular and cybercrime at its highest level, IT professionals and software companies need to ensure that Remote Desktop Servers are set up securely, ensuring clients
Posted  on February 23, 2018
shutterstock 526323934

How small business owners can steer clear of data breaches

If you collect customer data, you have an enormous responsibility to steer clear of data breaches and keep your customers’ personal information safe. From credit card numbers and bank accounts
Posted  on January 7, 2019
cloud-based software

The tangible benefits of a cloud-based solution

The emergence of cloud-based technology has positively transformed the way contract management and procurement professionals select the software they need to support business process improvement. But how? Security is paramount
Posted  on March 9, 2020