• Search All

    Business & Technology Insights

So far, in our Workforce Transformation blog series, we’ve covered Productivity , Protection , and Platform . Today, we’ll look at the fourth “P” that rounds out the Four Ps of Workforce Transf...

It’s no newsflash that technology is changing the way the modern workforce gets things done, and the rate of change at which technology is impacting business seems to be increasing day-by-day. The...

As we dive into the 4 Ps of Workforce Transformation, we begin by examining how modern organizations are realizing greater productivity. Today, we’ll take a closer look at the second “P” of Workf...

In this series, we’ve gone beyond the job posting to get a better understanding of some of the roles at BDO Digital. We’ve talked to a Software Developer, an Infrastructure Systems Engineer and a ...

In part two of our Workforce Transformation blog series, we’ll look at the second “P” of successful digital workforce transformation – Protection . In an increasingly digital world, humans have ...

Last year was a bad year for cybersecurity. Remember the Equifax breach ? Wannacry ? And more phishing attacks to count? Breaches have gotten bigger, hackers have gotten smarter, and security te...

Is Your Organization Prepared? As we approach May 25 th , many organizations are preparing for the EU’s General Data Protection Regulation, also known commonly as GDPR. This regulation applies t...

In the second half of our Workforce Transformation blog series, we’ll take a closer look at the 4 Ps of Digital Workforce Transformation, beginning with Pr o ductivity . Organizations with hig...

In my last blog post (Gaining User Adoption in Data Analytics Projects - Part 1), I discussed the critical role user adoption plays in becoming a data-driven organization. In this blog, we’ll iden...

73% of cybersecurity breaches are financially motivated, according to the 2017 Verizon Data Breach Investigations Report. This means the attackers are after your organization’s data to sell on the...

In our Rethinking Productivity blog series, we’re looking at the demands of a modern workforce and what organizations need to do to become more productive. The current gaps in productivity show us...

In working with clients over the years, I’ve seen the same challenges emerge after the launch of a new data analytics solution – gaining user adoption . Invariably, every organizations runs into ...

By now you’re probably aware of Microsoft’s plans to replace Skype for Business with Teams. Some of us saw this coming when Microsoft integrated the group chat experience into Teams, essentially m...

In today’s fast-paced business environment, workforce productivity is the new definition of corporate competitiveness. At its most basic level, this means companies that are able to derive more va...

Building a REST API is a great way to write reusable code that can be consumed using many different technologies. However, deciding which technology to use when building your REST API application ...

The following exchange describes how security architecture decisions are made in many organizations: IT PROFESSIONAL: “We need to implement this new product or feature.” BUSINESS LEADER: “Ok...

Technology innovations and enablement are booming. This shouldn’t be news to anyone. However, you might be surprised to learn that despite this drastic increase in technology, productivity has onl...

In my last blog, we talked about challenges of creating a successful data analytics strategy. In this blog, we’ll identify 5 key focus areas for reliable data analytics delivery in your midsize or...

From Money Ball to precision medicine, the media around data analytics has reached a fever pitch. Stories abound about how data science has been applied to win the World Series, make millions, and...

In November 2017, the Global Cyber Alliance in partnership with IBM and Packet Clearing House launched a new service to help combat cybercrime which is free for personal and business use. It is a...

Historically, the projected monthly cost of solutions that require indefinite storage would grow linearly based on the space requirements of the application. However, as the amount of data in the ...

The PCI Data Security Standard (PCI DSS) has required multi-factor authentication (MFA) since its earliest versions. With the recent updates to PCI DSS v3.2 published in 2016, organizations are al...

While many aspects of traditional IT have been made easier in the cloud, migrating to the cloud does not necessarily equate to greater simplification across the board. Perhaps one of the most chal...

On January 3rd, 2018, news was publicly disclosed about a pair of security vulnerabilities named “Meltdown” and “Spectre”. They are both related to hardware vulnerabilities in modern processors. ...

In my last blog, I highlighted the shortcomings of the three most common security assessments. Today, we’ll explore a way to overcome these challenges. At its most basic level, the job of any sec...

Despite mid-size organization’s desire to capitalize on the cost-saving benefits of the cloud, ramp-up expenses are holding organizations back from moving as fast as they would like. This can be f...

Security assessments are an essential tool in answering these three important questions: Are we secure? Where do we go from here? Which security investments will provide the most benefit ...

In today’s competitive marketplace, people must work smarter and faster than ever before. Business executives and IT leaders know they need to continuously look for new ways to improve communicati...

|<  <  1 2 3 4 5 6 7 8 9 10  > ...  >|

Page 10 of 18