Diligent Blog

5 Ways to Strengthen Your Third-Party Management Program

Given that third party vendors and affiliations have become an integral part of day-to-day operations,…

Benefits of Vendor Hosting vs. On-Premise Hosting

When high-level, sensitive data is being shared, like that between executives and board members, organisations…

Do you know your vendors?

Risk is everywhere. A contractor installing a video screen bills clients from an unsecured coffeehouse…

Family business management – five ways to improve family engagement

Diligent recently sponsored the second annual Family Business Transitions Mexico Conference, held in early…

Five Steps to Bridge the Cybersecurity Gap Between IT and the Board

Imagine if a band of marauders stood outside your corporate headquarters 24 hours a day,…

Four Common Hacking Attacks You Need to Know About

If you think “cyber attack” only means “data theft,” think again. Your company should be…

Four Ways to Avoid Being a Hacker’s Next Target

Cybersecurity is a high-stakes topic for every company. You probably heard the wake-up call when…

Why Mobility In Governance, Risk And Compliance Is A Must-Have Element In Organisations

What are the advantages of mobilising your governance, risk and compliance applications? Our partners at…

The New Board Diversity Test: Do You Have a Tech Expert?

Having a diverse board is a hot-button issue with many companies and their shareholders. Gender…

State of Security: Human Error and Remembering the Essentials

Phishing may seem innocuous and something you’d never fall victim to but chances are that…