Mentoring ensures newly trained business analysts are immediately productive.
Mobility can be maximised as a business platform without compromising corporate data security.
Planning and budgeting inform the entire enterprise performance management cycle.
The local public sector`s data quality problems are exacerbated by systems and processes that are still in transition.
Information today flows through and beyond the organisation more easily than ever before.
Fraudsters find the Internet is the perfect place to obtain personal information.
Hackers and information criminals have created a new threat environment.
CIOs are again regaining some of the power and influence they held formerly.
Although authoritarian environments can make people unhappy, rules are important if anarchy is to be prevented.
Poor awareness of weak points and the inability to recognise internal threats are just two rising security threats.
The discipline enables the ultimate enduring competitive advantage.
The `human factor` can be the weakest link in the VOIP security chain.