tianyi ma WiONHd zYI4 unsplash

Don’t fall for phishing…

Stay safe out there November 24 is both National and International Computer Security Day. We probably used to take security for granted. Using the same passwords endlessly – sometimes just
Posted  on November 24, 2023
bernard hermant IhcSHrZXFs4 unsplash

Stay safe in cyber space – protect your people, your assets and your reputation

Chances are that every company you know is going through some kind of change. Digital transformation has defined the 21st century and the stats are jaw-dropping. For example, did you
Posted  on October 2, 2023
finger 2081169 640

Digital signatures VS electronic signatures

What is a digital signature?  Is it the same thing as an electronic signature?  In an ever-evolving technological landscape, in which new and updated terminology and functionality are relentlessly presented
Posted  on July 5, 2020
westminster 1472807 640

Four tools for better government contract management

Our cities, our councils and our public agencies can maximise ROI by investing in software tools for streamlined, robust and transparent contract management, purchasing, and sourcing for current and future
Posted  on June 18, 2020
security breach

Security revisited – stay cyber-safe with Contract Insight

As cyber attacks are on the rise across the globe, we need to remain vigilant to these pervasive, complex threats to our livelihoods. Increasing globalisation, a complex hybrid cloud environment
Posted  on April 8, 2020
risk control strategies

Data protection strategies to minimise risk

Data protection is a priority in any business. Developing risk control strategies to minimise and control risk is an essential aspect of responsible business management. The following framework will help
Posted  on March 23, 2020
cloud-based software

The tangible benefits of a cloud-based solution

The emergence of cloud-based technology has positively transformed the way contract management and procurement professionals select the software they need to support business process improvement. But how? Security is paramount
Posted  on March 9, 2020
Why you should be implementing two factor authentication in your business 1

Why you should implement 2FA in your business

Two-factor authentication (or, more generally, multi-factor authentication) is a method of validating the identity of a user, as part of an access control process, which requires more than one identifying
Posted  on May 16, 2019
shutterstock 689788498 1V2

Cyber warfare 2019

Trends, opportunities and threats A constant state of war Guess what? The risks from malware, data breach and other cyber attacks are here to stay. It’s a sobering thought to
Posted  on March 13, 2019
shutterstock 520407727

AI and intelligent software identify and prevent risk

Any contract – no matter how favourable the terms may seem – can bring risk as well as opportunity. To secure your enterprise, your team and your reputation, it’s important
Posted  on February 28, 2019
shutterstock 725782942

Implement two-factor authentication in your business

Weak passwords are a reality in both business and personal life. Password exploits are the preferred method for hackers to breach both corporate and private systems today, with thousands of
Posted  on February 13, 2019
31 How to keep your data safe while travelling

How to keep your data safe while travelling

Despite the rise of easy video conferencing, there are times in business when only face-to-face meetings will do. But when you’re travelling on business, you still need access to your
Posted  on February 11, 2019