Business, Team, Coaching, Lessons

Lessons Learned from Sports: Part One

For many years I had the privilege of being able to play various roles in building a community sports organization and working in sport at the provincial level, learning from coaches with immense experience, who are devoted to developing the sport community in general.

Despite being mostly “retired” from these roles, I still find myself applying athlete development analogies to business and professional development situations.  There is so much we can learn in business from those who are very skilled at mentoring athletes and coaches.

Read More
By Larry Skelly on Jan 17, 2019 5:44:26 PM
Digital Transformation, IT, Information Technology, Field Service Management, FSM, Chief Information Officer, Asset Management, CMDB

Digital Transformation: Know Where You’re Starting From

Everyday businesses face a unique set of challenges and must consider a changing array of variables and scenarios. These dynamic realities make it very difficult to identify the "best time" for integrating new processes, making it impossible to generalize the problem into a one-size-fits-all type of answer, especially when it comes to Digital Transformation. The variables with DT are even more of a factor given its inherently adaptable and far reaching impact.

In this blog, we will look at two common scenarios that are often experienced and from there, entertain some practical solutions on how you can successfully integrate DT processes as efficiently as possible.

 

Read More
By Jon Fraser on Jan 10, 2019 4:25:57 PM
InfoSec, PCI, DSS, Payment Gateway, credit cards, debit cards, IDS/IPS, CDE

PCI DSS: When to Test Controls & Functions

Although 2019 promises a new version of the Payment Card Industry Data Security Standard (PCI DSS) the current version 3.2.1 is the de facto standard for measuring security programs for all merchants and service providers that participate in commerce using credit or debit cards.

There are twelve major requirements in the PCI DSS, and considering the complexity of the material we have chosen to dedicate individual blogs to the different requirements. The focus of these blogs will be to provide tips and pointers, help provide clarity for “what’s new” and to enhance understanding so that your organization can achieve a sustainable security posture that easily satisfies the requirements of the PCI DSS.

Read More
By Jeff Man on Jan 3, 2019 4:51:51 PM
Technology Trends, AI, RPA, Robotic Process Automation, CFO, Finance, Automation, Workforce, Efficiency, Gartner

The Upward Trend of AI for Finance

Why are so many companies looking to integrate AI into their day-to-day business processes?

While some people have concerns that AI is being used to reduce the number of workers, the reality is that AI can be used to drive efficiency and raise productivity. By assigning high-frequency, repeatable business activities to robotic processes, organizations are able to focus more time and attention on higher level activities. 

Read More
By Jamie Michie on Dec 17, 2018 10:58:35 AM
Technology Trends, Chief Technology Officer, CTO, Blockchain, Security Breach, Design Thinking Process, Passwords, End-Point, Agile Adoption, technology consulting, Artificial Intelligence, GDPR, Digital Experience, Digital Transformation, Security, InfoSec

Our Top 10 Favourite Blog Topics From 2018

2018 has been a year of rapid technology growth. We have seen changes to the security landscape, an increased adoption of AI and continued generational adjustments to our workforce.  As we look back over the last 12 months, we wanted to share some of our favorite blog posts from 2018 that touch on some or all of these topics: from risk and security assessment, to user experience, design thinking, business consulting, and everything in between. Happy reading!

Read More
By Jamie Michie on Dec 10, 2018 1:07:47 PM
Passwords, Hacker, Cell Phone, Juice Jacking, Security Breach, USB Ports, Black Friday, Cyber Monday

3 Ways to Protect Your Data From Hackers

(A friendly reminder from our RSP team on practical ways you can avoid being a target of identify theft when shopping on & offline this holiday season.)

What's Your Cellular Data (Protection) Plan?

There’s no shortage of stories from around the globe on new ways that hackers are learning to access our personal data.  Important preventative measures include keeping up-to-date antivirus software, having an active firewall, and using strong passwords.  Even with these controls in place, this can lead to a false sense of security.

While many of us focus on protecting laptops and computers, we often don’t stop to think about protecting our personal or work-assigned smartphones, which is exactly what criminals are counting on. 

Read More
By Security Consulting Team on Nov 23, 2018 4:27:17 PM