Professional Services

Insight is the new GOLD

My children will never face the challenges that I did. No television, no personal cell phones, and don’t ask me about my first computer (which…

April 17, 2024 4 minutes read
Managing your digital assets

Managing your digital assets

You’ve no doubt spent lots of time and money creating and curating high-quality digital assets. Now the question is: How do you manage the growing…

July 22, 2021 2 minutes read
Regain control over your corporate data

Regain control over your corporate data

In today’s global economy, business success and growth are affected by rapid changes in market requirements, short innovation cycles and rising demands for internal and…

July 22, 2021 3 minutes read
How to effectively deliver virtual training

How to effectively deliver virtual training

COVID-19 has significantly altered how we deliver and consume training. With companies moving to remote work, many employees are now balancing work and responsibilities at…

June 23, 2021 3 minutes read
Enrich EIM solutions with business intelligence

Enrich EIM solutions with business intelligence

Changing business priorities require your organization to focus on optimizing for efficiency to ensure positive impact to the bottom line. In the current climate, solutions…

June 8, 2021 5 minutes read
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and third-party applications such as…

June 3, 2021 6 minutes read
NIST Privacy Framework – The Communicate function

NIST Privacy Framework – The Communicate function

In the first blogs, we focused on the Identify, Govern, and Control functions of the NIST Privacy Framework. In this segment, I’m going to focus…

June 1, 2021 4 minutes read
Choosing the right supplier portal for vendor invoice management

Choosing the right supplier portal for vendor invoice management

Have you ever thought of improving the end-to-end process of vendor invoice management (VIM) by making it digitized and collaborative? It’s now possible for your suppliers to take an active role in…

May 28, 2021 3 minutes read
How to implement a new software system

How to implement a new software system

The efficiency, productivity and innovation for an organization can stem from implementing the latest software applications in a timely and effective manner. This represents a…

May 17, 2021 8 minutes read
Remote Nunavik villagers connected by timely translation

Remote Nunavik villagers connected by timely translation

Job opportunity. Offre d’emploi. ᐱᓇᓱᒐᑦᓴᖅ Job postings on the Kativik Regional Government (KRG) Facebook page are displayed in three languages: English, French and Inuktitut, the…

May 6, 2021 2 minutes read
Document access control

Document access control

Access scenarios today are more complex than ever, thanks to the increased need for mobility, usability and flexibility. Think, for example, about all those millions…

April 20, 2021 3 minutes read
What is software implementation?

What is software implementation?

Every year, organizations all over the world implement new software packages and systems. Every year, many of those organizations struggle to realize the benefits of that software implementation.  Having…

April 19, 2021 8 minutes read
NIST Privacy Framework – Control

NIST Privacy Framework – Control

In our first two blogs for the NIST Privacy Framework, we discussed the Identify and Govern functions. In this segment, our focus is on the Control function that defines the appropriate activities to enable…

January 29, 2021 5 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.