Technology

Tweets and likes for businesses

It’s easy to launch a social media presence. All you need is internet connectivity via your desktop, laptop, cell phone or tablet. But before you jump in, think of social media as an extension of your current communications strategy. Assess your communication goals, then consider whether a social media presence will help you reach your target market and if it is a good vehicle to deliver your messages. Keep in mind that the primary aim of social media is not to sell, but rather to build relationships.
Technology

Focus on systems and partners

Consider the technology provider as your core business platform provider. Generally, Policy Administration platforms have built a solid reputation for messing up and have come under much criticism in the boardrooms of many of the Insurance Institutions. This has raised some serious questions. Your service provider needs to align their business plans with those of their key clients. In order to do this, you need to build a strong partnership facilitated by trust. Both the client and the provider need to be profitable.
Technology

The risky business of cyber threats

Did you think 20 years ago your business would need to consider cyber insurance? Cyber criminals have moved away from targeted attacks to more opportunistic approaches, and anyone can be vulnerable to cyber crime. Managing Director of CyGeist, Natalie van de Coolwijk, recommends cyber defence in the form of cyber insurance, designed to address the cyber threat landscape where traditional insurance cover still fears to tread.
Technology

25 years of radical IT change

The computing environment is far more complex today than it was 25 years ago because of the wide range of technologies and systems which must be integrated successfully and seamlessly. The sheer number of platforms available necessitates team work and the development of new roles as it is simply impossible to know every aspect of the industry. As more and more systems become integrated the possibilities for what can be achieved seem endless.
Technology

Paper protection

There is nothing new about the protection of information – it is merely the technology and the understanding of the protection of information that has changed. Julius Caesar is credited with creating the Caesar Code…
Technology

Top 10 security tips for Gen Y

If you are part of Gen Y, connectivity is an important part of your daily life. But while tweeting, friending, and googling may be routine, are you protecting yourself online? According to a recent ZoneAlarm…