Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs January 11, 2023 For $62.59, the 8 Character Password is Still Dead Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organisations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the… Whitepaper October 22, 2020 How Firms Can Tackle Technology Risk Blind Spots to Build Resilience Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt… Newsletter March 14, 2024 Why Boards Should Care More About Geopolitics Than Ever Before Geopolitical risk seems higher than at any point in recent memory. Managing this risk effectively should be a core competency for all businesses — and the board should lead the way.After decades of globalisation shaping the world order, businesses are now forced to accept a new reality. Geopolitical risk is an ever-growing threat with far-reaching potential consequences. This risk arises from a… Blogs June 30, 2023 How to Incubate a winning innovation program When leaders consider how technology has enabled transformation of business models over the past several years, few would disagree that the world has changed dramatically. Retail, entertainment, music and banking have largely moved online. It’s a familiar story: Netflix beat Blockbuster; Amazon beat Borders. More recently, Tesla has transformed the experience of buying, owning and driving a car. Whitepaper September 2, 2022 Guide to business continuity & resilience Plan for the Unexpected. Build Resiliency. Instill your organisation with the advantage to endure company disruptions and consistently meet business goals with reduced financial, operational, cybersecurity, and efficiency losses. Assess your areas of risk and develop, enhance, as well as maintain plans to enable resilience, regardless of the circumstance. Flashing back to 2020, the world… Flash Report April 28, 2022 Protecting your organisation from insider threats in a changing world Cybersecurity threats are growing exponentially as companies introduce an increasing number of Internet of Things (IoT) devices into operations and collect and store an ever- escalating amount of data. This technology and data sprawl is providing bad actors with more entry points into networks and systems. Too often, organisations have failed to make commensurate investments in data protection,… Newsletter April 20, 2020 Compliance Insights - April 2020 Your monthly compliance news roundupOCC Reinforces Third-Party Risk Management ExpectationsRegulatory expectations related to third-party relationships have evolved considerably since 2013, when the Federal Reserve Board and Office of the Comptroller of the Currency (OCC) issued prescriptive guidances SR 13-19 and OCC 2013-29, respectively. To account for this evolution, the OCC… Blogs August 10, 2023 Technical debt demands your attention Technical debt consumes nearly one-third of technology budgets and more than one-fifth of technology professionals’ time; 70% of CIOs and technology leaders view technical debt as a major drag on their organisation’s ability to innovate. Flash Report March 9, 2023 New White House Cybersecurity Strategy Creates Additional Concerns for Businesses The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help… Blogs July 19, 2023 Creating Read-Only Roles for Microsoft Dynamics 365 Finance and Supply Chain Management This blog post was authored by Sarah Guthrie - Senior Consultant, Enterprise Application Solutions on Protiviti's technology insights blog. In today’s fast-paced business landscape, organisations rely heavily on robust enterprise resource planning (ERP) systems like Microsoft Dynamics 365 Finance and Supply Chain Management to streamline operations and drive growth. However, granting… Load More