How to Use Strategic Program Management To Elevate Your Trust & Safety Program

Program management is an important part of every type of program from anti-piracy to compliance to fraud. Today we’re going to focus on how strategic program management can help elevate your Trust & Safety program through communication, organization, and reporting. Whether you manage programs relating to digital crimes, digital safety, cybersecurity or fraud prevention, these…

Read More

Consent Phishing: An Increasing Threat

As the pandemic continues to keep many workers home from the office, companies are using cloud services and apps more than ever. This heightened use of virtual tools has led to an increase in certain types of phishing attacks. In particular, we are seeing a rise in consent phishing. What is it? Consent phishing is…

Read More

7 Tips for Keeping Connected While Working Remotely

It’s been months and many of us are still working at home because of the pandemic. We’ve found workarounds for being outside the office and adjusted to at-home workstations (even if it’s a laptop at the dining room table). We’re meeting deadlines and keeping up with our tasks, but some of us are feeling disconnected…

Read More

Helping Your Community Through Crisis

In a time of crisis, those of us who can help our community, should. There is certainly ample opportunity during our current situation. IPS was proud to donate meals to local hospitals in partnership with Red Letter Hospitality, a local management company. Since their restaurants are currently only open for takeout, they started a program…

Read More

Social Distance Yourself From Online Coronavirus Scams

Rapidly changing information about the coronavirus is making all of us anxious to consume as much news as possible. Things can be a bit scary, and it’s worse when you feel like you don’t know what’s going on. However, we must stay vigilant – there are criminals out there who want to capitalize on this…

Read More

Process Documentation: Why and How?

What’s the point of process documentation? Would you bake a cake without a recipe? Build a house without a blueprint? Obviously, most of us wouldn’t. Especially if we have standards for our output. Especially if we want each of our cakes to taste the same. We can think about our business processes in a similar…

Read More

Privacy in the Digital Age: The Necessary Actions

In Part One, Privacy in the Digital Age: The Issues, we discussed several cases involving the amount of data that is available and the lack of privacy laws. Today we’ll look further into what we need to do as consumers, governments and companies to address these problems. We need to be proactive instead of reactive…

Read More

Privacy in the Digital Age: The Issues

In the digital age, we are always on our phones, tablets and computers. There are cameras everywhere. In fact, even our refrigerators are smart. So, what’s the correct balance between personal data privacy and access to evidence by law enforcement? How do we manage security vs. privacy? What rights do companies have to use and…

Read More