We're changing it up today from our regular style of blogs, and are excited to share our first Vlog! In today's feature post we sit with Heidi Deras, a Business Analyst and exceptional Onliner who describes how BAs can assist Agile Product Owners to be successful.Read More
Customer Experience, Online Business Systems, Online Business Systems Winnipeg, Winnipeg, WCISC, VP, Client Relationships, customer service
Back in May, I had the chance to attend the WCISC conference in Winnipeg and listen to James Comey share his thoughts on security, leadership and integrity. If you’ve had the opportunity to hear James Comey speak, regardless of your political persuasion, I think you’ll agree with me – he is an excellent communicator. Over the hour session he shared many humorous and impactful stories about his role as the Director of the FBI and the direction that his life has taken.Read More
We hear a lot about the pace of change and the increasingly sophisticated threats facing organizations today. You don’t have to look much further than the daily headlines to read about new ways of doing business, or the latest successful data breach.
What’s becoming very clear is that Cybersecurity is not a sprint, but rather a marathon.
Each leg of the race presents new challenges and requires a commitment to diligence, risk management, and continuous program improvement. What we’ve done in the past is now proving to be insufficient and ineffective for the unpredictable terrain ahead. Different threat landscapes requires different solutions …and occasionally you need to stop, rest, and re-hydrate along the way.
Digital Transformation has become quite the industry buzzword. It’s become a goal for most organizations to achieve, yet more than half of these attempts are unsuccessful. What is it that prevents a successful digital transformation? If you’re not one of the companies that has already failed or is on the verge of failure; keep reading to ensure you too, don’t become part of that rapidly growing statistic.Read More
IT, Information Technology, Online Business Systems, Online Business Systems Winnipeg, compliance, Digital Business transformation, Post Secondary, Higher Learning, University of Manitoba, University of Winnipeg, University of Washington, OpalQM, Program Management
In less than a week, one of Canada’s largest information technology conferences will take place in Winnipeg.
“CANHEIT is the largest gathering of Canadian higher education IT leaders from universities, colleges, technical institutes and advanced research computing (ARC) experts. It will offer a unique forum to explore the latest best practices, opportunities and challenges within the realm of higher education technology.”
Like Agile development practices—Design Systems are quickly becoming another proven methodology woven into the fabric of the digital product process. From Finance and Energy—to Agriculture and Education; enterprise companies everywhere are reaping the cost-saving benefits of having a well-designed and maintained Design System.
But what exactly is a Design System? Why is it important to have one? How do you begin to implement and maintain one, and when should you consider building one for your organization?Read More
Your personal health data is not only very private, but it is very valuable. Healthcare organizations across North America (and the world) are continually needing to invest in security programs that protect their patient information through physical security, technology, and managing human-led processes and workflows.Read More
As North America’s leading Digital Transformation and Cybersecurity consultancy, Online takes great pride in building a culture that supports and builds teams of professionals; which ultimately benefits our valued Clients.Read More
So, let me tell you a story. This is a true story. A personal story about a request I got from someone who is near and dear to me.
These kinds of requests are becoming more and more common and so I wanted to share what happened so that you can recognize it when somebody comes knocking on your door (or email) with a similar ask. Who would suspect that a gift card could be the tool of a phishing attack? You should.