Diligent Blog

Information Security Governance Best Practices

Data breaches will happen. It’s not a question of if, but when. Whether it’s criminals…

Cloud Storage Hack: 4 Reasons Why Some Cloud Storage Solutions Aren’t Secure Enough for the Boardroom

With the increase of hacking activity around the world, user data has become more valuable…

5 Ways to Strengthen Your Third-Party Management Program

Given that third party vendors and affiliations have become an integral part of day-to-day operations,…

Benefits of Vendor Hosting vs. On-Premise Hosting

When high-level, sensitive data is being shared, like that between executives and board members, organisations…

Do you know your vendors?

Risk is everywhere. A contractor installing a video screen bills clients from an unsecured coffeehouse…

Family business management – five ways to improve family engagement

Diligent recently sponsored the second annual Family Business Transitions Mexico Conference, held in early…

Five Steps to Bridge the Cybersecurity Gap Between IT and the Board

Imagine if a band of marauders stood outside your corporate headquarters 24 hours a day,…

Four Common Hacking Attacks You Need to Know About

If you think “cyber attack” only means “data theft,” think again. Your company should be…

Four Ways to Avoid Being a Hacker’s Next Target

Cybersecurity is a high-stakes topic for every company. You probably heard the wake-up call when…

Why Mobility In Governance, Risk And Compliance Is A Must-Have Element In Organisations

What are the advantages of mobilising your governance, risk and compliance applications? Our partners at…