How CFOs can reduce information security risk
Data security isn’t just something that your IT team needs to address.
Since a breach can impact every area of an organisation, keeping sensitive data secure is also a t...
Ricoh – The Transition Expert
Most local governments have relied on paper-based systems for their entire history, which may be up to hundreds of years. It can be difficult to change something that has...
Protect yourself against wearable tech hacks
The wellness movement has started to take the tech world by storm. Every day, more of us want to better understand our health and fitness - and whether that’s done by tra...
How to protect your data from ransomware
We’re working in a world where technology, workplaces, and behaviors are rapidly evolving. And while this has greatly improved many aspects of business, there are also ce...
Avoid Scandals by using ECM
As noted in a recent CP24 article, the city of Toronto recently uncovered a long-running bid-rigging scandal. Contractors were regularly colluding in order to split proje...
Cybersecurity: Don’t overlook your printer
Originally posted on Nuance What’s Next Feb. 22, 2017
It’s happened again. According to a recent article in ITPRO, a hacker was able to gain access to more than 15...
How to solve your AP processing problems
Accounts payable: busy work? Or critical business function?
Accounts payable processes are highly transactional and typically very labour intensive. Invoice processing f...
Are shadow IT downloads harming your business?
Shadow IT is probably affecting your business right now. Do you need to do anything about it?
Shadow IT, the appearance of unapproved, undocumented, unsanctioned, and un...