Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Sort by: Relevance Date Filter Search Sort by RelevanceDate Order AscDesc Blog November 22, 2021 Automating the RFP Process Leveraging Nintex Workflow Cloud and Microsoft Power Automate The challenge A global hospitality firm approached Protiviti late in 2020 to address its highly-manual proposal process. This organization used shared email inboxes and a complex monitoring and routing process to track requests for proposals (RFPs) When the team received RFP requests, they used several criteria to determine the associated account managers for those requests and then forwarded the… Blog November 29, 2021 Still Playing Whack-A-Mole With Cloud Compliance? How to Simplify With Microsoft It’s a challenging landscape out there in the world of compliance. Regulatory changes, data privacy concerns and evolving trends like the hybrid workplace are requiring companies to increase their focus on compliance, in all forms. Huge fines and potential brand damage from data breaches or the discovery of non-compliance by regulators can be crippling. Yet we see organizations continuing to… Blog December 1, 2021 How Process Mining Enables the Acceleration of the Digital Transformation Journey The COVID-19 pandemic has forced most organizations to revisit their digital transformation roadmaps to continue to both grow market share and provide exceptional customer service. Companies had to rethink their digital transformation objectives as most customers have changed their levels of engagement with products and services. Today’s consumers are looking for agility, flexibility and… Blog December 6, 2021 Achieving Technical Agility Agile practices are enabling teams across organizations to reimagine how to manage change and deliver services, but to achieve true business agility and become agile across the organization, it is crucial that we think beyond the scope of a team. Cross-functional leadership must recognize the need to work across lines of responsibility and address concerns of COOs, CIOs, CISOs, CDOs and other… Blog December 7, 2021 5 Critical Questions for IoT Device Security It’s no surprise that the Internet of Things (IoT) is undergoing rapid growth, creating a scenario where the tools are in high demand, but as technology outpaces the IoT ecosystem’s expansion, a vast attack surface is being created. What those new to IoT may not realize is that many IoT devices are being hacked within five minutes of being connected to the internet. Why? Because they have very… Blog December 13, 2021 Preparing for Cyber Disruption - The Future State of Ransomware Every day, clients come to us with questions about ransomware and how to best prepare their organizations against potential attacks. This is perhaps one of the most vexing challenges in cybersecurity as ransomware attack methods, motivation and barriers to entry are constantly evolving. We’ve collated three key questions that concisely explain ransomware: How do these attackers target my… Blog December 14, 2021 How Zero Trust Can Defend Against Ransomware As the number of ransomware attacks rise, the failure of businesses to properly invest in cybersecurity tools, technologies and trained resources continues to become more prevalent. Not only do the ransom demands continue to increase but the average cost of ransomware recovery continues to skyrocket. Sophos research revealed that the average ransomware recovery costs are $1.85 million compared to… Blog December 16, 2021 Log4Shell Frequently Asked Questions In response to the Apache Log4Shell vulnerability, we have compiled a list of the most frequently asked questions we are receiving from clients and the strategies we are seeing pursued across the market. Protiviti is monitoring this event closely and will continue to update this blog post to reflect the most accurate information. Last update: 1/7/2022 What is Log4j? Log4j is a Java-based logging… Blog December 17, 2021 Establishing an Omnichannel Data Management Process Using SAP Information Steward SAP Information Steward is a web-based application that provides users with centralized environment to analyze, assess, categorize, monitor and improve the enterprise data quality. This tool consists of five core functionalities: data insight, metadata management, cleansing package builder and match review. In this article, we will go over the basic functionalities of each area, followed by our… Blog January 4, 2022 Preparing For a More Protected Union The United States federal government has been acting to strengthen its cyber defenses. The actions taken and planned will not only impose new compliance obligations on governmental bodies, but also on private sector technology and service providers that deal with the government — and for businesses that support these providers. Recently, we hosted a webinar entitled To Form a More Protected Union… Load More