Is Your Biggest Threat Internal

Is Your Biggest Threat Internal

Your company could be compromised, even with a relatively tech-savvy workforce. Fooled into allowing attackers access to company networks, it is this mode of access that is one of the biggest cyber security challenges. Perceptive, well-meaning employees can be fooled...
Self Service Still Needs Self Actualization

Self Service Still Needs Self Actualization

Many companies’ experience of self service business intelligence (BI) is similar to the early days of agile development; companies were then drawn to a model that promised improved business-IT relations and expedited delivery cycles. This was particularly...
Social media by nature easily exploitable

Social media by nature easily exploitable

Social media is surely one of the phenomena of the 21st Century. Everyone has a favorite social media platform and this has changed the way we communicate – sharing news and gossip. Twitter and Facebook, for example, are force multipliers when it comes to the spread...
Top Three BI Tools

Top Three BI Tools

Self-service business intelligence makes data discovery and analysis remarkably easy. The three next generation tools only make this statement more true. Watching these new, easy-to-use and exploratory BI products outsmart and outperform the older platforms is seeing...
Rising Threat of Social Media Attacks

Rising Threat of Social Media Attacks

Social media is a useful tool for any business. Its ability to reach and engage with customers is unrivaled. However, with the rise in use, so comes the rise in attacks using this medium. Hackers and fraudsters have also cottoned on to the ‘potential’ in...
Choose The Right Smartphone Encryption

Choose The Right Smartphone Encryption

Most companies now have smartphones, if not as standard, for a select group of key employees. These devices are now capable of calculating numbers in spreadsheets, email and storage of commercially sensitive documents. As workforces become ever more reliant on remote...