“We have an adoption problem”. I’ve heard these words many times over the years. What they should really be saying is “we have a critical problem – the entire project is failing!”. System adoption is not the only measure of project success, but it’s one of the most important. Retrospectively resolving a system adoption problem […]

Continue reading ›

Effective User Acceptance Testing (UAT) is critical to ensuring that the new software and processes meet the needs, of both the business and individuals. It allows for any issues to be identified and fixed before the system goes live. Problems identified after go-live can have a serious negative impact on the business and user adoption. […]

Continue reading ›

The lack of effective communication is one of the top complaints from users when organisations implement change. It can be difficult to get right. The business leaders may understand why this change is necessary for the business, but the employees may not. Effective communication should promote the value of the upcoming change – for both […]

Continue reading ›

The Ascertus Change Management in Digital Transformation Blog Series1/6  Delivering Project Success to Customers – A Step by Step Approach It’s not good enough to merely implement technology successfully. The real test of success for a system lies in the tangible value it delivers to the business, which in turn depends on the technology’s user […]

Continue reading ›

Fundamentally, records management is about information governance, which in turn – given all the regulatory scrutiny that exists today – is key to minimising operational risk. Due to the continuous and exponential growth of data in a variety of formats, a manual approach to records management is likely to be a losing battle. On the […]

Continue reading ›

Supply chain risk management is not a new concept; but in recent times the issue has come to the fore, primarily driven by cyber security, but also regulatory compliance. Like for many other types of risk (e.g. financial, operational), it’s important for organisations to build in resilience against supply chain risk too, given its the […]

Continue reading ›

Increasingly, corporate legal departments are deploying document and email management systems.  This technology has become essential for lawyers’ day today activities. Simultaneously, lawyers are recognising the need for better collaboration, both internally and with outside legal counsel, as well as the ability to reuse and re purpose information.  They don’t want to unnecessarily ‘reinvent the […]

Continue reading ›

Phishing attacks as we know, are malicious and orchestrated by external parties. Often due to their sophistication, despite the best efforts on the part of employees, criminals manage to trick them into giving access to business-critical and/or sensitive information. Therefore, the importance of continuous staff awareness and training cannot be emphasised enough. Pessimistic security Equally, […]

Continue reading ›
thoughtleadership_insiderthreat

The Ascertus Security Thought Leadership Series Minimising Risk of Inadvertent Insider Threat Digital transformation today is a no brainer for organisations, but research shows that such initiatives are putting their sensitive data at risk. This is caused – mostly inadvertently – by the ease of access to information, enabled by modern technology adoption, that in […]

Continue reading ›
why wouldnt you move to the cloud

Lawyers today routinely work off their smartphones and mobile devices to conduct business and yet some firms are reluctant to deploy enterprise systems in the Cloud, preferring on-premises implementations instead. Rightly, organisations are concerned about security, but at the risk of repetition, very few organisations can provide the level of investment in cybersecurity and continued […]

Continue reading ›