Views & Analysis from our Experts
bd-blog-hd-hires2.png
No Science Fiction: Tactics for Recruiting and Retaining Higher Education IT Positions

The late science fiction writer (and college professor) Isaac Asimov once said: “I do not fear computers. I fear the lack of them.” Had Asimov worked in higher ed IT management, he might have added: “but above all else, I fear the lack of...

Share:
The Pros and Cons of Pre-Contract Gap Analyses

When an organization wants to select and implement a new software solution, the following process typically occurs:

Share:
Change Management: Keeping Employees Motivated During Multiyear Projects

People are naturally resistant to change. Employees facing organizational change that will impact day-to-day operations are no exception, and they can feel threatened or fearful of what that change will bring. Even more challenging are multiyear...

Share:
Can Outsourcing Increase Revenues and Reduce Cycle Time? Yes, If it's the Right Fit

Cost increases and labor issues have contributed to the rise of outsourcing as an option for senior living and health care providers.  While outsourcing of all types is a growing trend — from the C-suite to food service, it is a decision that...

Share:
BerryDunn’s Cybersecurity Playbook for Management: Discovery

A professional sports team is an ever-changing entity. To have a general perspective on the team’s fluctuating strengths and weaknesses, a good coach needs to trust and empower their staff to discover the details. Chapter 5 in BerryDunn’s...

Share:
Data Governance: Gain Control

The day-to-day work of providing government services involves collecting, using, and storing large amounts of data. The data that government agencies accumulate is a critical asset — it holds answers about which programs perform best, which...

Share:
SaaS: Is it right for you? Making SaaS determinations a snap.

While new software applications help you speed up processes and operations, deciding which ones will work best for your organization can quickly evolve into analysis paralysis, as there are so many considerations.

Share:
How Healthy is Your Organization’s HIPAA Compliance?

Over the course of its day-to-day operations, every organization acquires, stores, and transmits Protected Health Information (PHI), including names, email addresses, phone numbers, account numbers, and social security numbers.

Share:
Swarmbots, Hivenets, and Other Stinging Insects

With the rise of artificial intelligence, most malware programs are starting to think together. Fortinet recently released a report that highlights some terms we need to start paying attention to:

Share:
External Capacity: Cybersecurity Playbook for Management #4

Just as sports teams need to bring in outside resources — a new starting pitcher, for example, or a free agent QB — in order to get better and win more games, most organizations need to bring in outside resources to win the cybersecurity game....

Share:

Leave a comment

STAY CONNECTED