Sample papers 1/2
Today volatility, uncertainty, complexity and ambiguity have been amplified tenfold as we move towards a post-Brexit environment. The UK leaves the EU by mid 2019 and as that moment approaches so the debate is widening in terms of what this will mean for the UK and the wider global economy.
We know that a strict security regime, rigorous employee training and sound accounting policies can help prevent costly attacks. Yet, it is surprising how few companies are deploying robust cyber security mitigation and remediation processes.
There are many threats to enterprise cyber security with most coming from external threat factors.
The colocation market is growing as the corporate world continues its digital transformation and companies outsource their massive data-storage needs to data centres.
Enterprise security teams have historically spent most of their time, human resources and money on defenses like firewalls and Intrusion Detection Systems (IDS) to protect and monitor the security of their networks.
When dealing with digital transformation initiatives, having visibility into IT infrastructure shouldn’t be a choice, it should be a requirement
Like most markets with explosive growth, it comes with both challenges and opportunities, as well as a need to respond to more sophisticated and changing consumer preferences and ongoing regulatory shifts.
When it comes to credit management, the skills needed to become a credit professional are more complex than you think.
Finance has always been the home of the truth inside an organization
Software licensing is a complicated topic, but knowing a little about software licensing can help you make sense of all the fine print.
A data breach is a serious incident for any business. The reality of a data breach is that it’s not if, but when will it happen to your company.
is book effectively illustrates the dynamics that collections and credit management bring to the
world of customer service and the customer experience.
The digital universe is growing 40% a year into the next decade, expanding to include not only the increasing number of people and enterprises
doing everything online, but also all the “things” – smart devices – connected to the Internet.
Today’s businesses face an uphill challenge to keep their customers loyal, and with the Google effect meaning that competitors are only a click away; instilling loyalty
amongst existing clients is the new imperative.
The smartphone is a mere decade old, and yet with every year it has become ever more integral to people’s lives.
It’s hard to believe that 2018 will mark the 10-year anniversary for both the Apple App Store and Android Market
Clients are increasingly looking for the element of trust that comes from the combination of action, words and conduct.
Compared to traditional approaches to organizing and carrying out important backoffice functions, the modern shared services centre is rightly regarded as a significant step forward.
The IT world continues to grow leaving IT leaders to face an incredibly complex landscape as they try to adopt, integrate and manage various legacy architectures.
Almost two-thirds of global 1,000 businesses have over 10,000 suppliers in their vendor master file, but being assured of the credentials of each and every one of those vendors is far from straightforward.
Drawing on the results of a recent industry roundtable, VoiceSage’s Lee Trenam looks at the increasing interest of brands in proactive engagement, and how the challenges can be overcome.
Today we are all ‘multi-screeners’ using more devices than ever before to run our daily lives and with the advent of Internet of Things (IoT) we are going to get more devices, not less, to accomplish those goals.
Retail is becoming an increasingly data rich environment as more of the business goes digital, creating many more data capture opportunities.
A seismic shift occurs in the data management world in May 2018 when the General Data Protection Regulation becomes law in the European Union.
For all the talk of the need to improve organizational agility, the pharmaceutical industry hasn’t found this easy because there are so many practical barriers in the way.
The way life sciences organizations work and collaborate has changed drastically over the past decade or so
From the handling of customer orders, bills, manufacturer and design, through incoming documents from suppliers etc, to internal documentation for
employees – and it is easy to see how businesses are struggling to handle, store and access both electronic and physical documentation throughout the
Behind any series of sporting events is a great tech story, and this summer was no different.
The implications of Brexit on Contracts is fraught with unknowns, particularly for the IT sector.
Commercial industry has been radically changed by the application of digital technologies, and companies can no longer afford to sit still.
It might have flashing lights, be carbon neutral and look just like a piece of designer furniture, but if your office state-of-the-art tech does absolutely nothing for your company's productivity, it will be all for nothing.
IT budgets and resources are tied up with the day-to-day issues of managing legacy deployments.
Financial institutions have invested money looking at Blockchain. However, there are now quite a few different approaches to Blockchain-based distributed ledgers.
New survey findings reveal insights into how accountants see Making Tax Digital as a cost burden.
You have just decided to outsource your IT needs rather than trying to juggle it all in-house. So where exactly do you start in terms of choosing an IT company?
When the time came to roll out its marketing campaigns, there was a clear lack of efficiency within Citroën Nordic’s dealerships. To overcome this,
As the SQL monolith splinters, we are ending up with increasingly more datahandling options for CEOs.
Severn Energy recently turned to DM (Document Management) to solidify its success and get a fully integrated and always-available cross-company Finance
we are generating a huge volume of digital content from mobile usage, the Internet, and come the Internet of Things expect a lot more.
Fraudsters are using legitimate executive names and email addresses to dupe unsuspecting employees to wire money or sensitive documents to