Reporting

Best Practices for Microsoft Power BI Accessibility

Poorly constructed analytics dashboards can be difficult for users to consume at the best of times. Making dashboards accessible for a broad range of users with neurodiverse and physical limitations is doubly challenging. Yet it is not impossible. In this paper, IBRS recommends a range of better practices for building highly accessible and effective dashboards with the features of Microsoft’s Power BI.

Read More »

Wicked Game: How to Secure Senior Executives’ Cyber Security Buy-In

No cyber security program can be successful if the executive buy-in is not secured during its initial planning stages. However, many organisations still lack top management that believes in a strong security culture – or invest the time and resources needed to establish and maintain one. What factors contribute to their shortsightedness, and what strategies can CISOs use to convince them otherwise?

Read More »
Security

Practical Security Guidance for Organisations

Implementing a cyber security framework can be difficult due to the lack of practical detail in most conceptual frameworks, making it challenging to minimise risk. The Center for Internet Security’s (CIS) controls provide a tactical approach to supplement and measure an organisation’s security stance.

Read More »

Search