At the heart of customer relationship management (CRM) is the recognition that the customer is central to all business activities of the systems integrator, and that the success of the company is dependent on how well this is understood across all business operations.
“Three or four years ago, I got smart after I realized how much I don’t know,” says Larry Halpern, president of Safe Systems, Louisville, Colo. With 28 years of experience
Provisioning should blend the duties of human resources (HR) and IT and security departments. When asked where access and provisioning sits, most organizations say with IT, and if you’re looking
We live in a world where we begin and end each day awash in communications of all forms. From newspapers and television broadcasts to cell phones, computers and radios, our
The problem of counterfeiting – the sale of imitations or replicas of branded products, such as handbags and watches – is often proportional to a brand’s success. The more popular
According to ACFE research, organizations worldwide lose an average of 5 percent of their revenues each year to fraud. And criminals are using ever-increasing sophistication to pilfer their employers’ assets. Clearly, companies cannot afford to ignore indicators of fraud that may exist. With so much at stake, management must proactively look for fraud.
Although an all-out prohibition might seem to be the simplest way to deal with the security risks of social media, it is not necessarily the wisest approach. The technology does
Perhaps more than ever before, corporations are finding themselves vulnerable to prohibited conduct, whether it results from internal errors or from the criminal intent of increasingly sophisticated persons acting inside
Imagine a world where license plate recognition (LPR) technology and advances in city-wide video surveillance make it possible to spot suspects and criminals so quickly and comprehensively that law enforcement
Common wisdom over the last couple of decades has been to never write down the passwords you use for accessing networked services. But is now the time to begin writing