The lack of effective communication is one of the top complaints from users when organisations implement change. It can be difficult to get right. The business leaders may understand why this change is necessary for the business, but the employees may not. Effective communication should promote the value of the upcoming change – for both […]

Continue reading ›

The Ascertus Change Management in Digital Transformation Blog Series1/6  Delivering Project Success to Customers – A Step by Step Approach It’s not good enough to merely implement technology successfully. The real test of success for a system lies in the tangible value it delivers to the business, which in turn depends on the technology’s user […]

Continue reading ›

Fundamentally, records management is about information governance, which in turn – given all the regulatory scrutiny that exists today – is key to minimising operational risk. Due to the continuous and exponential growth of data in a variety of formats, a manual approach to records management is likely to be a losing battle. On the […]

Continue reading ›

Supply chain risk management is not a new concept; but in recent times the issue has come to the fore, primarily driven by cyber security, but also regulatory compliance. Like for many other types of risk (e.g. financial, operational), it’s important for organisations to build in resilience against supply chain risk too, given its the […]

Continue reading ›

Increasingly, corporate legal departments are deploying document and email management systems.  This technology has become essential for lawyers’ day today activities. Simultaneously, lawyers are recognising the need for better collaboration, both internally and with outside legal counsel, as well as the ability to reuse and re purpose information.  They don’t want to unnecessarily ‘reinvent the […]

Continue reading ›

Phishing attacks as we know, are malicious and orchestrated by external parties. Often due to their sophistication, despite the best efforts on the part of employees, criminals manage to trick them into giving access to business-critical and/or sensitive information. Therefore, the importance of continuous staff awareness and training cannot be emphasised enough. Pessimistic security Equally, […]

Continue reading ›
thoughtleadership_insiderthreat

The Ascertus Security Thought Leadership Series Minimising Risk of Inadvertent Insider Threat Digital transformation today is a no brainer for organisations, but research shows that such initiatives are putting their sensitive data at risk. This is caused – mostly inadvertently – by the ease of access to information, enabled by modern technology adoption, that in […]

Continue reading ›
why wouldnt you move to the cloud

Lawyers today routinely work off their smartphones and mobile devices to conduct business and yet some firms are reluctant to deploy enterprise systems in the Cloud, preferring on-premises implementations instead. Rightly, organisations are concerned about security, but at the risk of repetition, very few organisations can provide the level of investment in cybersecurity and continued […]

Continue reading ›
quality of services

Quality of service is often a subjective concept with people defining its components and metrics differently. From a technology vendor’s perspective, superior quality of service is a combination of a reliable solution and a high level of support. Here are five signs that a conversation with your technology vendor is in order: 1. Support pricing […]

Continue reading ›
Geroge Bertolis - Cultural Security

We are at high risk of being immune to security breaches. With new security infringements grabbing the headlines on almost a daily basis, time and again one hears IT Directors and departments resignedly admit that a security breach is a matter of when, not if. At the same time, regulation is increasing with the risk […]

Continue reading ›