Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog September 5, 2018 Managing Data Governance in a Cloud-Focused World The rate at which companies are amassing data is staggering. More than half of organizations today (57%) have production workloads running in the cloud and with the amount of new devices being introduced that create, consume and transmit data to the cloud, it has become critical to have some type of cloud governance program in place. However, one of the most challenging elements of such a program… Blog July 12, 2023 Preparing for Hurricane Season: Ensuring Resiliency in the Face of Natural Disasters The advent of hurricane season each year (June – November) reminds organizations operating in U.S. coastal regions that having a comprehensive resiliency plan is no longer an option. Increasingly, meteorologists are predicting more frequent and more dangerous storms, challenging traditional concepts of disaster recovery. Source: NOAA National Centers for Environmental Information (NCEI) U.S.… Blog July 18, 2023 Optimizing Microsoft Dynamics 365 Licensing Costs Microsoft Dynamics 365 Finance and Operations (D365 F&O) prices its license based on the security objects assigned to a user. Each security object is associated with a user view or user maintenance license, indicating the license type required for either read access to the menu item or maintenance (anything above read permissions). A user will be associated with the highest license their… Blog July 19, 2023 Riding on 5G, Fixed Wireless Access Technology Continues to Make Huge Waves This blog originally appeared on The Protiviti View. The big picture: Financial reports released by the world’s largest mobile carriers in the first quarter show significant growth in fixed wireless access (FWA) customers – the clearest signal yet that 5G, which allows homes and businesses to connect to the internet through radio frequencies instead of cables, is gaining serious… Blog July 25, 2023 Emerging Trends in IAM Part 1: Simplified Engineering Workforce hybridization and changes to the centralized nature of business operations over the last few years have sparked a digital reformation in the way IT functions around the globe deliver their services, especially cybersecurity. Securing key assets and data in a hybrid world has highlighted many challenges for CIOs and CISOs across the board. One of the largest challenges is securing… Blog February 14, 2020 Planning Makes the SAP S/4HANA Journey Compliant and Secure “Data is the new water.” That observation by a chief information officer we met a few months ago really nails the way we think about data security and compliance today. He went on to say, “We have to reserve it. Preserve it. Share it. And make sure it’s clean.” Innovations in cloud, mobile, social media and big data mean the opportunity for increased risk. And that increased risk means that data… Client Story June 30, 2023 Change Management & Digitalisierung: Finanzoperationen von Bildungsdienstleister im Wandel Manuelle Prozesse und veraltete Systeme wurden durch agile Tools und maßgeschneiderte Technologien ersetzt. Dies führte zu stabileren Kontrollen, optimierten Reportings sowie einem messbaren ROI. Blog June 21, 2023 Funding Cyber Protection: A Closer Look at State and Local Grant Programs Over the last few years, the Biden administration has heightened the awareness, requirements and activities associated with protecting the American government, critical infrastructure and counterparty commercial entities from cybersecurity attacks. Whether attacks are from state-sponsored entities or independent hacker groups such as Anonymous, there is a need to ensure appropriate controls are… Blog June 22, 2023 Creating Read-Only Roles for Microsoft Dynamics 365 Finance and Supply Chain Management In today's fast-paced business landscape, organizations rely heavily on robust enterprise resource planning (ERP) systems like Microsoft Dynamics 365 Finance and Supply Chain Management to streamline operations and drive growth. However, granting unrestricted access to sensitive financial and operational data can pose security risks and compromise data integrity. That's where read-only roles come… Blog June 27, 2023 Using Cyber Risk Quantification to Manage Chaos The most important use of any risk assessment tool is that it must contribute to better decision making on how to manage individual risks. Whether that is treating and reducing risk, or accepting that risk exists, risk management activities must ultimately help management make better decisions. Executives and risk management leaders, though, are increasingly faced with risk decisions they have… Load More