Portfolio

A vector image of a burglar standing behind a large laptop computer. On the keyboard, a man in a business suit stands with a sword in one hand and a shield in the other. Behind him to the right are images of files and identification cards, symbolizing private data he is protecting from the robber.

The new controls playbook against cyber enabled vendor fraud

Vendor fraud isn’t new, but it’s becoming more sophisticated and successful. In recent incidents, fraudsters combined cyber and financial crime techniques to hijack, impersonate or manipulate their victims for personal gain. Data from PwC’s 2022 Global Economic Crime Survey shows that cybercrime was the most common and the most disruptive crime experienced by organizations over the past two years regardless of industry or revenue.

A vector image of three people working together on a computer with construction equipment to solve problems around application management

Navigating a new approach for unmanageable applications

What’s the buzz with “unmanageable applications,” and the COVID hangover? Turns out, employees want full control over the applications they use for work—but not every application supports industry and security standards. Banning or blocking unmanageable applications isn’t working, and research shows employees are using their preferred applications despite company policies and prohibitions. So, what’s the solution? Find out in my newest blog post, written for… Read More »Navigating a new approach for unmanageable applications

Vector image of employees working together to manage notifications at various points of interaction

FOMO vs. Info: Managing notification overload

As the business environment evolves with new ways of working and entirely new job descriptions, managing how we send and receive communications is an ever-changing field. The number and variety of platforms we use to communicate – both personally and professionally – continues to grow. We can let tools manage us or choose how to manage them. Obviously one of those options is smarter.

Two mobile phone face each other, one with a screen showing a man in a yellow shirt, the other showing a robber holding a face mask, pretending to be someone else.

How you can avoid fraud risks after a de-SPAC

Special purpose acquisition companies (SPACs) made history last year, with over 600 SPACs raising more than US$145 billion in initial public offerings (IPOs). Over the past few years, SPACs have become a more popular method for private companies who want to go public fast by expediting the traditional IPO process, providing access to additional capital and reducing transaction costs.