In addition to smooth technical project implementation, successful projects painstakingly deliver against the pertinent elements of deep discovery including infrastructure health checks, project requirements and user needs; effective and meaningful communication on the promise of the ‘change’; user acceptance testing; and tailored, ongoing training.     All these elements fundamentally focus on the end user experience […]

Continue reading ›

The importance of technology for business continuity has come to the fore like never before. With uncertainty reigning over the lockdown, many organisations are keenly going ahead with scheduled business-critical IT projects – all made possible by cloud technology. Remote cloud project implementations are immensely successful and there’s little difference in the way they are […]

Continue reading ›

“We have an adoption problem”. I’ve heard these words many times over the years. What they should really be saying is “we have a critical problem – the entire project is failing!”. System adoption is not the only measure of project success, but it’s one of the most important. Retrospectively resolving a system adoption problem […]

Continue reading ›

Effective User Acceptance Testing (UAT) is critical to ensuring that the new software and processes meet the needs, of both the business and individuals. It allows for any issues to be identified and fixed before the system goes live. Problems identified after go-live can have a serious negative impact on the business and user adoption. […]

Continue reading ›

The lack of effective communication is one of the top complaints from users when organisations implement change. It can be difficult to get right. The business leaders may understand why this change is necessary for the business, but the employees may not. Effective communication should promote the value of the upcoming change – for both […]

Continue reading ›

The Ascertus Change Management in Digital Transformation Blog Series1/6  Delivering Project Success to Customers – A Step by Step Approach It’s not good enough to merely implement technology successfully. The real test of success for a system lies in the tangible value it delivers to the business, which in turn depends on the technology’s user […]

Continue reading ›

Fundamentally, records management is about information governance, which in turn – given all the regulatory scrutiny that exists today – is key to minimising operational risk. Due to the continuous and exponential growth of data in a variety of formats, a manual approach to records management is likely to be a losing battle. On the […]

Continue reading ›

Supply chain risk management is not a new concept; but in recent times the issue has come to the fore, primarily driven by cyber security, but also regulatory compliance. Like for many other types of risk (e.g. financial, operational), it’s important for organisations to build in resilience against supply chain risk too, given its the […]

Continue reading ›

Increasingly, corporate legal departments are deploying document and email management systems.  This technology has become essential for lawyers’ day today activities. Simultaneously, lawyers are recognising the need for better collaboration, both internally and with outside legal counsel, as well as the ability to reuse and re purpose information.  They don’t want to unnecessarily ‘reinvent the […]

Continue reading ›

Phishing attacks as we know, are malicious and orchestrated by external parties. Often due to their sophistication, despite the best efforts on the part of employees, criminals manage to trick them into giving access to business-critical and/or sensitive information. Therefore, the importance of continuous staff awareness and training cannot be emphasised enough. Pessimistic security Equally, […]

Continue reading ›