finger 2081169 640

Digital signatures versus electronic signatures: what’s the difference?

What is a digital signature?  Is it the same thing as an electronic signature?  In an ever-evolving technological landscape, in which new and updated terminology and functionality are relentlessly presented
Posted  on July 5, 2020
westminster 1472807 640

Four tools for better government contract management

Our cities, our councils and our public agencies can maximise ROI by investing in software tools for streamlined, robust and transparent contract management, purchasing, and sourcing for current and future
Posted  on June 18, 2020
security breach

Security revisited – stay cyber-safe with Contract Insight

As cyber attacks are on the rise across the globe, we need to remain vigilant to these pervasive, complex threats to our livelihoods. Increasing globalisation, a complex hybrid cloud environment
Posted  on April 8, 2020
risk control strategies

Data protection strategies to minimise risk

Data protection is a priority in any business. Developing risk control strategies to minimise and control risk is an essential aspect of responsible business management. The following framework will help
Posted  on March 23, 2020
cloud-based software

The tangible benefits of a cloud-based solution

The emergence of cloud-based technology has positively transformed the way contract management and procurement professionals select the software they need to support business process improvement. But how? Security is paramount
Posted  on March 9, 2020
Why you should be implementing two factor authentication in your business 1

Why you should implement two factor authentication in your business

Two-factor authentication (or, more generally, multi-factor authentication) is a method of validating the identity of a user, as part of an access control process, which requires more than one identifying
Posted  on May 16, 2019
shutterstock 689788498 1V2

Cyber warfare 2019

Trends, opportunities and threats A constant state of war Guess what? The risks from malware, data breach and other cyber attacks are here to stay. It’s a sobering thought to
Posted  on March 13, 2019
shutterstock 520407727

Using AI and intelligent software to identify and prevent contract risk

Any contract – no matter how favourable the terms may seem – can bring risk as well as opportunity. To secure your enterprise, your team and your reputation, it’s important
Posted  on February 28, 2019
shutterstock 725782942

Implement two-factor authentication in your business

Weak passwords are a reality in both business and personal life. Password exploits are the preferred method for hackers to breach both corporate and private systems today, with thousands of
Posted  on February 13, 2019
31 How to keep your data safe while travelling

How to keep your data safe while travelling

Despite the rise of easy video conferencing, there are times in business when only face-to-face meetings will do. But when you’re travelling on business, you still need access to your
Posted  on February 11, 2019
33 How to securely store contracts in the cloud

How to securely store contracts in the cloud

These days, data protection (UK) or data privacy (US) is so important it even has its own day. January 28th, I’ve only just found out about it or you’d have
Posted  on February 6, 2019
Biggest tech mistakes 2018

Biggest tech mistakes 2018

Four lessons for your business from 2018’s tech scandals 2018 was a difficult year for tech companies. From the fallout Facebook faced in the Cambridge Analytica disaster to Elon Musk’s
Posted  on February 5, 2019