Phishing attacks as we know, are malicious and orchestrated by external parties. Often due to their sophistication, despite the best efforts on the part of employees, criminals manage to trick them into giving access to business-critical and/or sensitive information. Therefore, the importance of continuous staff awareness and training cannot be emphasised enough. Pessimistic security Equally, […]

Continue reading ›
thoughtleadership_insiderthreat

The Ascertus Security Thought Leadership Series Minimising Risk of Inadvertent Insider Threat Digital transformation today is a no brainer for organisations, but research shows that such initiatives are putting their sensitive data at risk. This is caused – mostly inadvertently – by the ease of access to information, enabled by modern technology adoption, that in […]

Continue reading ›
why wouldnt you move to the cloud

Lawyers today routinely work off their smartphones and mobile devices to conduct business and yet some firms are reluctant to deploy enterprise systems in the Cloud, preferring on-premises implementations instead. Rightly, organisations are concerned about security, but at the risk of repetition, very few organisations can provide the level of investment in cybersecurity and continued […]

Continue reading ›
quality of services

Quality of service is often a subjective concept with people defining its components and metrics differently. From a technology vendor’s perspective, superior quality of service is a combination of a reliable solution and a high level of support. Here are five signs that a conversation with your technology vendor is in order: 1. Support pricing […]

Continue reading ›
Geroge Bertolis - Cultural Security

We are at high risk of being immune to security breaches. With new security infringements grabbing the headlines on almost a daily basis, time and again one hears IT Directors and departments resignedly admit that a security breach is a matter of when, not if. At the same time, regulation is increasing with the risk […]

Continue reading ›
Project Management - A investment worth making

When your technology supplier provides you with a cost quote for a piece of work, which includes a line-item for project management, do you immediately think, “I can save X% of the budget by declining this service?” You are not alone. However, this approach is repeatedly counterproductive to the smooth delivery of projects. Project Managers […]

Continue reading ›
document and task management

Perhaps unsurprisingly, given the increasingly ‘deadline’ driven business environment that we operate in, recently we are receiving a fair number of queries from customers and prospects enquiring about solutions that can help them with a best practice approach to task management. At the recent iManage ConnectLive 2018 event in London too, the majority of our […]

Continue reading ›
HR Document Management System

Human resource (HR) departments typically generate and handle copious volumes of paperwork – employment contracts, appraisals, policies, employee handbooks, forms, templates and the list goes on. These documents contain some of the most sensitive and confidential personal data that an organisation might hold. Of course, many departments in large organisations deploy HR software such as […]

Continue reading ›
insider threat ascertus

A recent piece of research shows that 42% of IT security incidents are caused by employee actions and 74% originate from the extended enterprise – i.e. customers, suppliers, etc. Furthermore, it is noteworthy that 40% of businesses are seeing security incidents rising since 2015, with hacker threat down to 26% in 2017 – from 33% […]

Continue reading ›
Ethical Partnership

Should good quality service come at a premium? And does a premium price guarantee a top-notch service from the technology provider?  To provide some context to these ruminations, with a move towards value-based pricing, law firms today are having to justify their fee rates, especially if they are charging more than their competition.  Most commonly, […]

Continue reading ›