Stay safe out there November 24 is both National and International Computer Security Day. We probably used to take security for granted. Using the same passwords endlessly – sometimes just
Chances are that every company you know is going through some kind of change. Digital transformation has defined the 21st century and the stats are jaw-dropping. For example, did you
What is a digital signature? Is it the same thing as an electronic signature? In an ever-evolving technological landscape, in which new and updated terminology and functionality are relentlessly presented
Our cities, our councils and our public agencies can maximise ROI by investing in software tools for streamlined, robust and transparent contract management, purchasing, and sourcing for current and future
As cyber attacks are on the rise across the globe, we need to remain vigilant to these pervasive, complex threats to our livelihoods. Increasing globalisation, a complex hybrid cloud environment
Data protection is a priority in any business. Developing risk control strategies to minimise and control risk is an essential aspect of responsible business management. The following framework will help
The emergence of cloud-based technology has positively transformed the way contract management and procurement professionals select the software they need to support business process improvement. But how? Security is paramount
Two-factor authentication (or, more generally, multi-factor authentication) is a method of validating the identity of a user, as part of an access control process, which requires more than one identifying
Trends, opportunities and threats A constant state of war Guess what? The risks from malware, data breach and other cyber attacks are here to stay. It’s a sobering thought to
Any contract – no matter how favourable the terms may seem – can bring risk as well as opportunity. To secure your enterprise, your team and your reputation, it’s important
Weak passwords are a reality in both business and personal life. Password exploits are the preferred method for hackers to breach both corporate and private systems today, with thousands of
Despite the rise of easy video conferencing, there are times in business when only face-to-face meetings will do. But when you’re travelling on business, you still need access to your