BLOG Featured 24 Sept 2024 Whitepaper | Empowering Your Team: A Guide to Successfully Rolling Out Microsoft Copilot Part One: Piloting Copilot 24 Sept 2024 24 Sept 2024 14 Aug 2024 Whitepaper | Your Employees Are Probably Using ChatGPT – Are You Ready for the Risks? 14 Aug 2024 14 Aug 2024 23 July 2024 Supercharging CX with Customer Journey Management 23 July 2024 23 July 2024 15 Apr 2024 Hook, Line, and Sinker Building Phishing Resilience in Australian Businesses - Whitepaper 15 Apr 2024 15 Apr 2024 3 Apr 2024 Use Case | Australian Healthcare Provider Maximises Efficiency and Success Through Data Integration, Business Intelligence and Modern Reporting 3 Apr 2024 3 Apr 2024 19 Mar 2024 DATA: Data Debt - A Silent Challenge in Data Engineering 19 Mar 2024 19 Mar 2024 23 Feb 2024 Use Case | Unlocking Efficiency: Data Integration Transforms Travel and Accommodation Business 23 Feb 2024 23 Feb 2024 14 Feb 2024 Cybersecurity Myths Debunked - Whitepaper 14 Feb 2024 14 Feb 2024 9 Jan 2024 Data Security - ASD Cyber Threat Report 2024 9 Jan 2024 9 Jan 2024 29 Nov 2023 Cybersecurity: Cybersecurity Incident Response Plan 29 Nov 2023 29 Nov 2023 13 Oct 2023 Machine Learning with Unstructured Content: Text Analytics 13 Oct 2023 13 Oct 2023 6 Oct 2023 Cybersecurity: What is a cyber-aware culture, why it’s important, and how to create one. 6 Oct 2023 6 Oct 2023 21 Sept 2023 5 Real World Examples Using Predictive Analytics to Reduce Customer Churn 21 Sept 2023 21 Sept 2023 14 Sept 2023 Cloud Security - A Shared Responsibility | Understand the basics 14 Sept 2023 14 Sept 2023 27 July 2023 Top Data & Business Intelligence Trends 2023 Event - Recap 27 July 2023 27 July 2023 12 June 2023 Essential Eight Best Practices Guide: Multifactor Authentication 12 June 2023 12 June 2023 1 June 2023 WHITEPAPER | Excel or a Business Intelligence solution? When is it just better to stick with Excel. 1 June 2023 1 June 2023 9 Mar 2023 CYBERSECURITY VS INFORMATION SECURITY – WHAT’S THE DIFFERENCE? 9 Mar 2023 9 Mar 2023 20 Jan 2023 10 benefits of intelligent information management 20 Jan 2023 20 Jan 2023 14 Oct 2022 WHITEPAPER | HOW TO MANAGE TECHNOLOGY RISK IN YOUR BUSINESS 14 Oct 2022 14 Oct 2022 30 Sept 2022 Optus Data Breach - What You Need to Do 30 Sept 2022 30 Sept 2022 30 Aug 2022 WHITEPAPER | How Does Zero Trust Work? 30 Aug 2022 30 Aug 2022 26 Aug 2022 WHITEPAPER | Passwordless, What does the future hold? 26 Aug 2022 26 Aug 2022 26 Aug 2022 Importance of user training in modern cybersecurity 26 Aug 2022 26 Aug 2022 20 Aug 2022 Cyber Alert - Multiple Vulnerabilities in Apple Products 18-08-2022 20 Aug 2022 20 Aug 2022 10 May 2022 Whitepaper | ISO27001 – What Is It and Do You Need It? 10 May 2022 10 May 2022 19 Apr 2022 Customer Story | Meals on Wheels SA centralises IT to realise $50,000 cost saving 19 Apr 2022 19 Apr 2022 5 Apr 2022 Whitepaper | Don't get hooked - Phishing 5 Apr 2022 5 Apr 2022 23 Mar 2022 Customer Story | Accurate data delivers 1834 Hotels a competitive edge with Qlik 23 Mar 2022 23 Mar 2022 21 Feb 2022 Whitepaper | Mobile Device Security 21 Feb 2022 21 Feb 2022