it risks

Results 151 - 175 of 757Sort Results By: Published Date | Title | Company Name
Published By: ADP     Published Date: Aug 28, 2017
Many small businesses rely on owners and other employees to take on HR responsibilities in addition to their “day jobs,” a role we call the ad hoc HR manager (aHRM). Although a common practice, using an aHRM can present unforeseen risks. Read the complete guide to risky ad hoc HR management to find out more.
Tags : 
    
ADP
Published By: Quick Base     Published Date: Dec 18, 2017
This eBook reveals how spreadsheets come with hidden risks and costs – and how cost-effective, cloud-based, and customizable no-code databases present a better alternative. Based on a study of 700+ business, operations, and IT professionals, this eBook will help you to improve productivity, enhance decision-making, and centralize data.
Tags : 
    
Quick Base
Published By: Absorb     Published Date: Sep 05, 2018
Would you choose your LMS again? It happens to us all. We adopt learning technology expecting it to make us more efficient, prepared, and successful. At some point we wonder if it’s doing the opposite. Questions can be immediate or emerge over time. Either way, you’re stuck with technology that’s misaligned with where your organization’s going. So how do you know when it’s time to make an LMS change? After reading this checklist, “10 Ways Your LMS is Falling Short” you’ll understand: • Ten LMS challenges you may be experiencing • Risks these present to your organization • Features you need to start propelling your success Don’t let your LMS hold you back! Get the checklist
Tags : 
    
Absorb
Published By: Splunk     Published Date: Aug 21, 2018
How can you utilize machine data to support compliance with the General Data Protection Regulation of the European Union? This white paper, “How Machine Data Supports GDPR Compliance”, answers this question and identifies three use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment – on-premises, in the cloud or hybrid Download the white paper to: *Master the risks necessary to be prepared for GDPR through real-world scenarios *Understand which articles of GDPR will impact your business *Learn how machine data can help you overcome those requirements
Tags : 
    
Splunk
Published By: UL     Published Date: Sep 12, 2018
Performance textiles and fabrics are rapidly bringing apparel and footwear products into the 21st century. Manufacturers today are innovating at breakneck speed and bringing to the market synthetic textiles and fabrics with enhanced performance characteristics, or that feature embedded fibers or topical applications. This has led to the widespread introduction of advanced performance apparel and footwear that offer you new levels of comfort and safety. At the same time, sorting through claims regarding the performance characteristics of these advanced textiles and fabrics can present real challenges for manufacturers, retailers and you. At a minimum, the myriad of vague, conflicting or unsubstantiated marketing claims and characterizations used to promote these materials often result in frustration and disappointment. And fraudulent representations can unnecessarily expose apparel manufacturers and retail buyers to potentially hazardous chemicals and other risks.
Tags : 
    
UL
Published By: Workday APAC     Published Date: Dec 18, 2018
"Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say."
Tags : 
    
Workday APAC
Published By: Gigamon     Published Date: Dec 13, 2018
IDG survey confirms: CEOs consider cybersecurity a top priority. Get “Countering Escalating Cyberthreats” and improve your threat visibility across the entire network. As CEOs struggle with the risks of a digital business, it is time to adopt a more holistic approach to security. You can distribute traffic to the right tool at the right time, eliminate network weaknesses and keep your CEO happy. Read now.
Tags : 
    
Gigamon
Published By: Rackspace     Published Date: Feb 12, 2019
In today’s digital world, technologies such as cloud have become commonplace to take digital transformation projects to the next level. But while cloud is critical to business transformation success, Australian IT decision-makers (ITDMs) still feel that the C-suite does not understand the time and complexity of the journey. This paper explores: • Insights on challenges faced by Australian ITDMs when rolling out cloud projects • The role of the ITDM today • Key blockages IT stakeholders encounter when driving digital change, and; • What they need from the business and wider technology ecosystem to navigate the risks associated with starting a cloud project or moving to a full cloud-first model.
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
    
Rackspace
Published By: McAfee APAC     Published Date: Jun 25, 2019
Business accelerates in the cloud. Cloud adoption expands security risks. In this report, McAfee examined the latest IaaS security and adoption trends, analysed the types of sensitive data in the cloud and how that data is shared. They’ve identified the common threats in the cloud and uncovered the largest areas of risk in cloud computing today.
Tags : 
    
McAfee APAC
Published By: Sparton Corporation     Published Date: Oct 09, 2018
Manufacturing suppliers range from approved vendors and contract manufacturers (CMs) who only deliver materials and services to complex strategic partnerships. A transactional relationship based primarily on order fulfillment might work well for some companies. However, by taking a CM relationship to the next level of supplier-partner, organizations gain strategic benefits including cost savings, reduced risks, and optimized profits. The right cultural fit and the right-sized partner for your business can play a key role in building this long-term relationship.
Tags : 
    
Sparton Corporation
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: VMware     Published Date: Apr 09, 2019
As the world undergoes rapid digital transformation, shield yourself from the risks of having multiple cloud deployments. This eBook will show you how to simplify operational complexity with a hybrid cloud strategy – combining private and public clouds under a single operational model.
Tags : 
    
VMware
Published By: athenahealth     Published Date: Feb 27, 2014
The adoption of the ICD-10 code set will represent a significant change in the health care industry. This whitepaper outlines the five major risks of the ICD-10 transition that your practice should expect, as well as ways to ensure your medical billing, practice management, and EHR vendor is prepared to make your transition as smooth as possible.
Tags : 
athena, healthcare, healthcare technology, icd-10, icd-10 conversion, reporting, procedures, billing
    
athenahealth
Published By: Dun & Bradstreet     Published Date: Oct 21, 2016
The modern credit department is playing an expanded role in supporting sales and driving business growth. Traditionally, credit departments have focused on identifying potentially poor customers, thereby reducing losses and mitigating risks. Although this remains a critical function, credit departments also possess a wealth of data that can be mined to identify new business opportunities. With the help of new technologies, credit can work with sales departments by tapping into customer data and sharing insights for increasing sales. Download this white paper to learn more!
Tags : 
    
Dun & Bradstreet
Published By: RSM US     Published Date: Jan 04, 2018
Several economic factors are significantly impacting the hiring and retention practices for key finance and accounting personnel in every industry. However, many successful middle market companies are counteracting these challenges by leveraging outsourcing strategies to gain efficiency, overcome staffing difficulties and better manage costs. A significant shift is currently occurring with some economic indicators, as demonstrated in the recent RSM US Middle Market Business Index. Salaries are expected to rise in the next year, with hiring increasing and unemployment subsequently falling. With these challenges in mind, competition for talent is rising, and middle market organizations will face numerous risks when looking to attract and retain skilled finance and accounting personnel.
Tags : 
finance outsourcing, accounting outsourcing, outsourcing strategies
    
RSM US
Published By: Sophos     Published Date: Oct 07, 2015
This paper looks at BYOD security challenges posed by employees working beyond the company's secure perimeter, exposes the main BYOD security risks and proposes transitioning to a cloud-based security service.
Tags : 
security, byod security, bring your own device security, byod security challenges
    
Sophos
Published By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : 
gdpr, risk mitigation, email resiliency, personal data protection
    
Mimecast
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: KPMG     Published Date: Jun 06, 2019
Businesses increasingly see cloud as the best route to enhanced agility and digital transformation. But this survey reveals that keeping the lid on cloud costs is far from straightforward. Read this report to discover: • whether businesses are realising the benefits they anticipated from cloud migration • how effective companies are at managing cloud investments • the risks and consequences of getting locked into inefficient architectures.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
As businesses start to experiment with true artificial intelligence, safe delivery of AI demands a new risk and control framework. This report, designed for anyone tasked with the safe delivery of AI, proposes an effective solution. Read the report to find out: • the risks associated with AI and the challenge of managing them • a 17-category Risk & Controls framework for AI • in-depth details for key categories, including security management, business continuity and knowledge management • an essential glossary of AI terms.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Many organisations will be using AI sooner than anyone expects. Prepare now to address the risks from these advanced technologies with this comprehensive framework from our risk experts. Download this practical resource to see AI risk description, control topic and control description, COBIT process and COBIT area for 17 different AI risks.
Tags : 
    
KPMG
Published By: Juniper Networks     Published Date: Feb 01, 2016
Download this eGuide and learn the following: How the cloud and mobile have changed the enterprise How to manage the security risks of shadow IT Benefits and adoption strategies for shadow IT How the Juniper Unite architecture can help
Tags : 
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.