The Future of Risk Management Post-Pandemic

Learn lessons on adaptive working, shifting to global views on risk, and creating opportunities to innovate current risk mitigation practices.

You Ask. We Answer. Q&A about Risk Management’s Next Normal.

Get answers to your questions on how your risk management strategies should evolve to prepare your organization for the future, post-pandemic.

The Role of Internal Audit Post-Pandemic

Understand how internal audit is adapting to the demands of today and the unknowns of tomorrow – includes lessons on aligning internal audit to business objectives, smarter use of technology, and building connections with people.

HIPAA Compliance: Understanding HIPAA’s Safeguard Requirements

One of the main aspects of the HIPAA law is that it forces healthcare practices and professionals to keep and secure PHI (protected health information) from data breaches and other possible complications and problems. This makes HIPAA and other regulations associated with it something that’s extremely important to the risk and compliance field, especially when dealing with highly sensitive health data.

Administrator’s Toolkit Part 3: Sharing is Caring

As a relational database, Onspring lets you connect any of your data sets and records in logical relationships, from parent/child to sibling connections. Joining records provides very flexible reporting options, workflow automation and easily maintained access control.

Double Downtime: Good and Bad

A spoiled vacation resulted in the fortuitous availability of Onspring’s CTO, Chad Kreimendahl, when we experienced our first downtime in several years. Chad explains what happened, why it happened and how our technical team resolved the issue.

Preventing a Software Frankenstein with Design & Care

Have you created a software Frankenstein? Though the intent of your creation may have been something beautiful, the positive aspects of the design are quickly overshadowed by glaring design issues. This ultimately results in an army of villagers (your customers) chasing you down with fire and pitchforks. Chad Kreimendahl explains how to get yourself out of this monstrous dilemma.

Equifax Breach Data in the Wild

We know from reporting on the Equifax data breach that names, social security numbers, email addresses, and physical addresses were taken. This confirmation of the email in the wild should be considered a terrifying confirmation that the rest is also out there, or may be soon.

High Performance Software — Globally

I’ve been asked, on many occasions, how Onspring goes about being so insanely fast and responsive as a product. The most recent encounter related to a customer who has users spread all throughout the world. Their specific query was how their users in Asia were seeing absolutely no performance impact in the way one would expect when hitting our data center in the heart of the United States. Their average response time when making requests from their Asian offices to Onspring was less than 1/3rd of a second. That’s below 0.3 seconds per request. How is that possible?

Beware the Zombie: Design Hubris

If you’re an expert in your industry who’s designing a product or service, there’s a strong possibility that you’ve been a victim to this monster we call Design Hubris. Some of us are more susceptible than others, and the effects are almost always permanent, because they hit you early and they hit you deep. They spread like a virus, infecting all subsequent decisions and features.

Are You Scared Yet? You Should Be

At Onspring, we’ve spent much of our time and effort, both in product design and simply running our business, avoiding the “boogeymen” that disrupt so many forward-thinking companies. Running this gauntlet of ghouls has taught us many things, and the lessons of our former lives have frequently guided us when we might otherwise have wandered in the dark.

How Does Internal Audit Get Ahead When Your Tech Is Locked in Time?

A quick Google search for “internal audit software” reveals a long list of available solutions. Many of these providers (Onspring included) exhibited at the recent Governance, Risk and Controls (GRC) Conference in Phoenix, co-sponsored by the IIA and ISACA. In terms of sheer quantity of choices, internal auditors have no shortage of software at their disposal. But how many of these solutions enable internal auditors to (as the IIA Research Foundation report describes) “creatively innovate to stay a step ahead of the real-time pace of technology advancement”?