Warning: Use of undefined constant SECURE_AUTH_KEY - assumed 'SECURE_AUTH_KEY' (this will throw an Error in a future version of PHP) in /homepages/28/d166309528/htdocs/customers/realisedatasystems.com/www/wordpress/wp-content/plugins/cta/shared/classes/class.load-assets.php on line 190
The Four Key Features of a Data Audit Log System

The Four Key Features of a Data Audit Log System

Posted · Add Comment

We’ve listed the four most important features of any good data audit log system so you can check whether yours is up to scratch. A data audit log system tracks who’s changed what, when, and in what way. This information is essential for locating particular interactions, improper activities, and user errors. As such a data […]

cyber security

3 Ways Improving your Business Process Management can help with Big Data and Cyber Security

Posted · 2 Comments

Centralise access and security management. Everything becomes easier when all your data is in one place. Control all your accounts, credentials, roles and user access from one place and you’re reducing the chance of errors. You’re making life easier by simplifying your systems. If your data is spread over several systems, it can be tricky […]

Studying the Customer Experience with Data Tracking

Posted · Add Comment

As a consumer, I have had more than a few run-ins with disorganised field service organisations. During such occasions, I have always wondered why I am paying top dollar for a service when the company providing the service can’t even serve their customers properly. With all the technology and services out there, there shouldn’t be […]

data security and audit

A Weak Audit Trail is a Database Security Threat

Posted · Add Comment

Databases are arguably the heart and soul of any modern organisation.  They drive and inform business processes, supply business intelligence, and deliver valuable insights and records. Despite the power and effectiveness of databases, however, they remain very vulnerable. According to a report published by Verizon in 2012, databases have the highest rate of breaches among […]

cloud computing

Cloud Computing – Are you there yet?

Posted · Add Comment

If you take it from the mouths, or pens I suppose, of some of the most prestigious analyst firms in the world, now is the time for the cloud.  In today’s post, we are going to discuss the power of the cloud, and what exactly makes it the right choice for your organization. According to IDC “spending on cloud […]

What’s a Data Strategy?

Posted · Add Comment

Some of you may be rolling your eyes at the question “What’s a data strategy”?  In this case, you probably have already implemented one at your organization.  Kudos to you because according to research from Dataversity, you are one of only 11% of organizations that have. The truth of the matter is simple, even though people […]

3 Reasons Why Audit Log is Critical to Exceptional Customer Service

Posted · Add Comment

In today’s world there is not much differentiating between companies in terms of technology so where can you find your competitive edge? More than ever companies are concentrating on providing exceptional customer service.  This means providing more resources to deal with customer complaints, making them more productive and competent so when issues arise they can […]


The sad story of the incompetent audit log

Posted · Add Comment

We have told you before that a built-in audit log doesn’t have the functionality needed to keep your organization compliant. (You can read the blog post HERE). It also doesn’t help you deliver the best customer service or track user activity (it isn’t so great at the big picture). This time, however, we thought we […]


Why exactly is data auditing important?

Posted · Add Comment

According to Techopedia; “a data audit refers to the auditing of data to assess its quality or utility for a specific purpose. Auditing data, unlike auditing finances, involves looking at key metrics, other than quantity, to create conclusions about the properties of a data set.” In our case, when we discuss data auditing, we are talking […]