Is your university’s contract management modern?
Building construction, janitorial works, special event catering, are just a few of the contracting services that public or private facilities engage.
Universities and co...
Workplace technology: a ‘smartphone moment’?
Skills, technology, and automation – the three main enablers to success, according to business leaders. That’s one of the key findings from new Ricoh-commissioned researc...
Protecting yourself from ransomware – Part 1
This blog is the first in a two-part series about Ransomware and how you may be able to protect your organization – big or small – against the same. Part one of this seri...
Learn why cyber resilience is essential for your hybrid law firm
Recent years have seen a rapid evolution of legal services, and one shift that appears to be here to stay is remote working. With lawyers and staff working outside the tr...
3 areas where IT is changing
From working the help desk to specializing in databases and networking, there are many possible paths within an IT career. But with all of them comes a certain level of e...
Don’t be a data breach security headline
Healthcare Data Privacy and Security Is a Top Priority.
If you’re anything
like the healthcare C-level leaders we’ve spoken with recently, chances are
good that, i...
Is Ransomware Malware’s Killer App?
Computer viruses has been around for almost as long as computers themselves. Like many of the early tinkerers of computing, the motivations of early virus authors ran the...
SOC 2 compliance and why it’s important
If a colleague in Finance mentions “sock two,” they’re not referring to clothing that’s been lost in the wash. The “SOC” in SOC 2 stands for System and Organization Contr...