Wylie Blanchard https://www.wylieblanchard.com Wylie Blanchard | Business Technology Expert, Digital Executive Advisor & Speaker - Wylie Blanchard Tue, 10 Jun 2025 06:11:52 +0000 en-US hourly 1 /wp-content/uploads/cropped-Wylie-Blanchard-profile-photo_202008_IMG_7092_1100x1100-32x32.jpg Wylie Blanchard https://www.wylieblanchard.com 32 32 61397150 Illinois Privacy Compliance: What Every Business Owner Needs to Know https://www.wylieblanchard.com/illinois-privacy-compliance-what-every-business-owner-needs-to-know/ Sun, 01 Jun 2025 08:26:00 +0000 https://www.wylieblanchard.com/?p=8974 The Rising Stakes of Data Privacy. Whether you’re running a family-owned retail shop, growing a medical practice, or managing multiple office locations, if you handle customer or employee data, privacy compliance applies to you. In Illinois, two of the strictest privacy laws in the country—the Biometric Information Privacy Act (BIPA) and the Personal Information Protection Act (PIPA)—create clear legal obligations […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Silhouette of the state of Illinois with digital icons

The Rising Stakes of Data Privacy.

Whether you’re running a family-owned retail shop, growing a medical practice, or managing multiple office locations, if you handle customer or employee data, privacy compliance applies to you.

In Illinois, two of the strictest privacy laws in the country—the Biometric Information Privacy Act (BIPA) and the Personal Information Protection Act (PIPA)—create clear legal obligations that can cost thousands (or millions) if ignored.

As an IT consultant who works with small and midsize businesses across the state, I’m here to break down what you need to know and how you can protect your business before problems arise.

Understanding Key Illinois Privacy Laws

Biometric Information Privacy Act (BIPA)

BIPA regulates how private businesses collect, use, and store biometric data like fingerprints, facial scans, and retina scans. It requires:

  • Informed written consent before collecting or storing biometric data.
  • Disclosure of the specific purpose and storage duration.
  • public retention and destruction policy.
  • A strict prohibition on selling or profiting from biometric data.
  • Private right of action, meaning individuals can sue your business for violations.

Even something as common as a fingerprint time clock or facial recognition camera falls under BIPA. Penalties and fines can be applied for violations of negligence, recklessness or intentional action.

Personal Information Protection Act (PIPA)

PIPA focuses on safeguarding broader categories of personal data, including Social Security numbers, driver’s license numbers, medical and health insurance information, account numbers, and login credentials.

It requires:

  • Prompt breach notification to affected Illinois residents.
  • Reporting breaches to the Illinois Attorney General (if 500+ individuals are impacted).
  • Reasonable security measures to protect data.
  • Proper disposal of sensitive data.
  • Contracts with third parties that require them to maintain security.

Violations are considered unlawful practices under the state’s Consumer Fraud Act and can result in enforcement actions.

Common Compliance Pitfalls

Despite the legal requirements, many businesses unintentionally fall short. Here are some of the most common missteps:

  • Using biometric time clocks without proper notice or consent.
  • Collecting customer or employee data without a written policy or retention schedule.
  • Failing to implement encryption, firewalls, or access controls.
  • Assuming that cloud storage providers automatically ensure compliance.
  • Not having an incident response plan or breach notification process.

Often, the biggest risk comes not from bad intentions but from lack of awareness.

Steps Toward Compliance: IT Consultant’s Checklist

Here is a practical checklist to help your business align with Illinois privacy laws:

  1. Audit Your Data: Know what types of personal and biometric data you collect, where it’s stored, who has access, and how long you keep it.
  2. Create a Written Privacy Policy: Include clear language about data collection, usage, retention, and destruction.
  3. Implement Consent Procedures: Obtain written consent before collecting biometric data and explain how it will be used.
  4. Secure Your Systems: Use encryption, secure user authentication, regular patching, and monitoring to protect stored data.
  5. Train Your Employees: Ensure your staff understands data privacy procedures and how to respond to data incidents.
  6. Plan for Breaches: Develop and test an incident response plan, including breach notification protocols.
  7. Review Vendor Contracts: Make sure service providers who access your data agree to meet your security requirements.

The Cost of Non-Compliance

Non-compliance isn’t just a legal problem—it can be a business-ending event. Illinois courts have upheld massive BIPA settlements, with some cases costing businesses millions in damages. A single fingerprint scan collected without consent can lead to multiple violations, each carrying its own penalty.

With PIPA, a data breach could force you to notify thousands of customers, face scrutiny from the Attorney General, and deal with damaged customer trust.

Tools and Tech That Can Help

Fortunately, the right tools can make compliance manageable:

  • Consent management platforms to track and store written consents.
  • Data loss prevention (DLP) software to monitor sensitive information.
  • Security information and event management (SIEM) tools for real-time alerts.
  • Encryption solutions for both stored and transmitted data.
  • Automated backups with secure, offsite storage.

Don’t overlook free or low-cost training platforms to keep your team informed.

Make Privacy a Business Priority

Privacy compliance isn’t a one-time fix—it’s an ongoing responsibility. If you collect any form of personal or biometric data, you are legally and ethically responsible for protecting it.

By investing in secure systems, clear policies, and proper staff training, you’re not just avoiding fines—you’re building customer trust and long-term resilience.

If you’re unsure where to start or whether your current practices meet Illinois standards, now is the time to act.

Local IT consultants, privacy professionals can help you:

  • Audit your systems and data handling practices
  • Develop legally sound policies and consent forms
  • Deploy the right technologies for security and monitoring
  • Train your team to maintain compliance

Don’t wait until a lawsuit or a breach that forces your hand. Reach out to a trusted local technology expert today and take control of your privacy compliance strategy.


This content was originally posted on Medium

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8974
The Scammers Almost Got Me https://www.wylieblanchard.com/the-scammers-almost-got-me/ Sat, 26 Apr 2025 08:53:00 +0000 https://www.wylieblanchard.com/?p=8964 They almost got me. A week ago, we filed a new trademark application.Yesterday morning, we got an email.Looked official.Said a few items were missing from the application.Said we needed to send info to the USPTO. All day, I was thinking about that email.Telling myself, get the info together.Don’t want to mess up the process.Don’t want […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Laptop computer displaying an email message. in the background Alarm bell ringing in foreground. Image text: Phishing Attempt

They almost got me.

A week ago, we filed a new trademark application.
Yesterday morning, we got an email.
Looked official.
Said a few items were missing from the application.
Said we needed to send info to the USPTO.

All day, I was thinking about that email.
Telling myself, get the info together.
Don’t want to mess up the process.
Don’t want our application rejected.

Last night, I looked at the email again.
Something felt off.
Email address? Looked funny.
Didn’t have the right domain.
No links. No instructions.
Just the USPTO logo. That’s it.

So I went straight to USPTO.gov.
Logged in. Checked the application.
Nothing missing. No errors.
Everything looked fine.

Then I found the real email from USPTO when I first applied.
It said—watch out for scams.
Said all emails would come from USPTO.gov.

That email I got yesterday morning?
Didn’t have that domain.
Scam.

Took it a step further.
Used WHO.IS to check the sender’s domain.
Domain was created yesterday.
Classic scam move.

They almost got me.
But not in this attempt.

If I had been rushing yesterday morning…
If I had replied with info…
I would’ve given them sensitive details about me and our business.
Worse—I would’ve shown them I’m willing to communicate.

They could’ve kept emailing us.
Asking for more.
And I might’ve sent it.

So—watch those email addresses.
Check the content.
Don’t rush.


This content was originally posted on Medium

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8964
The Balance Between DIY and Professional Tech Support https://www.wylieblanchard.com/the-balance-between-diy-and-professional-tech-support/ Mon, 24 Feb 2025 03:43:53 +0000 https://www.wylieblanchard.com/?p=8929 How do you balance empowering employees to create technology solutions while maintaining IT oversight and governance? There’s a growing trend among business decision-makers who are stepping into “citizen developer” roles, using low-code or no-code platforms like Microsoft Power Apps or Power Automate. By leveraging their unique insights into everyday business challenges, these individuals are creating […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
How do you balance empowering employees to create technology solutions while maintaining IT oversight and governance?

Puzzle pieces connecting DIY Innovation to key business concerns

There’s a growing trend among business decision-makers who are stepping into “citizen developer” roles, using low-code or no-code platforms like Microsoft Power Apps or Power Automate. By leveraging their unique insights into everyday business challenges, these individuals are creating quick, innovative solutions without relying solely on traditional IT teams. The results can be transformative—enabling faster deployment, immediate value, and better alignment with specific organizational needs.


When Enthusiasm Meets Initiative

Embracing a do-it-yourself (DIY) mindset in technology can unlock fresh ideas and jumpstart operational improvements. Here’s why the non-traditional development approach can be so powerful:

  1. Empowerment and Growth
    • Business professionals gain technical confidence and new skills. This can lead to deeper engagement and an inventive culture that encourages continuous improvement.
  2. Rapid Prototyping
    • Low-code/no-code tools allow for immediate experimentation. Teams can quickly roll out prototypes to see what works, gather feedback, and iterate toward a more refined solution.
  3. Cost-Efficiency (Within Reason)
    • Early projects can often be handled with minimal investment, freeing up budget for more complex endeavors or resources that require specialized expertise.
  4. Team Morale
    • Celebrating internally developed solutions can energize an entire department, fostering a sense of ownership and collective pride.

Knowing When to Involve Experts

Even the most driven DIYer can encounter scenarios where professional IT support makes all the difference. Here are some key indicators:

  1. Advanced Security & Compliance
    • Certain projects, especially those involving sensitive data or regulatory obligations, require specialized oversight to minimize risks and ensure proper safeguards.
  2. Integration with Existing Systems
    • Solutions often need to communicate with CRMs, HR systems, or other enterprise platforms. Professional IT can guarantee seamless connections and data flow.
  3. High-Volume Scalability
    • A DIY prototype might work for a small team. However, scaling up can expose performance bottlenecks, architecture issues, or unmet infrastructure needs.
  4. Complex Troubleshooting
    • Hidden complexities or advanced workflows may demand deeper technical skills. IT experts can root out potential problems quickly and permanently.
  5. Future Maintenance & Enhancements
    • Low-code platforms regularly introduce new features and updates. An IT team can help ensure your solution stays aligned with platform changes, security patches, and emerging best practices.

From Collaboration to Cohesion

While citizen developers excel at rapidly bringing ideas to life, collaborating with IT—whether an internal department or an external provider—adds a layer of robustness and future-proofing. By blending each group’s strengths, you can:

  • Refine Architecture – Confirm that the solution’s underlying structure is efficient, reliable, and easy to expand.
  • Verify Security & Compliance – Meet relevant regulations, protect sensitive information, and avoid vulnerabilities.
  • Plan for Growth – Ensure the solution can scale alongside evolving business needs and frequent platform updates.

This balanced approach preserves the agility of citizen development while reinforcing it with specialized expertise for long-term success.


Citizen development represents a powerful shift, allowing business professionals to solve problems with tools that were once accessible only to seasoned developers. It can lead to faster innovation, reduced costs, and heightened ownership. However, it’s also important to know where the limits lie and when to bring in professional support to handle complexities and future-proof solutions.

If you’re exploring your own DIY initiatives or considering how best to maintain them in the long run, connecting with experienced IT professionals—whether internally or externally—can help ensure that you’re building secure, scalable, and sustainable solutions.


This content was originally posted on Medium

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8929
Beyond Certifications – The Cybersecurity Skill That Sets Leaders Apart https://www.wylieblanchard.com/beyond-certifications-the-cybersecurity-skill-that-sets-leaders-apart/ Sat, 08 Feb 2025 12:16:00 +0000 https://www.wylieblanchard.com/?p=8906 Certifications Open Doors, But They Don’t Make You Boardroom-Ready. I’ve met countless professionals who believe that earning certifications like CISSP, CISM, Security+, etc. is the key to advancing their careers. And while certifications are valuable—they demonstrate expertise, commitment, and a solid understanding of best practices—there’s one critical skill they don’t teach: how to communicate security […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Certifications Open Doors, But They Don’t Make You Boardroom-Ready.

Finger Holding Badge with text certified trust me

I’ve met countless professionals who believe that earning certifications like CISSP, CISM, Security+, etc. is the key to advancing their careers. And while certifications are valuable—they demonstrate expertise, commitment, and a solid understanding of best practices—there’s one critical skill they don’t teach: how to communicate security and technology risks in a way that leadership understands.

I have several myself: CISSP, PMP, ITIL, MCSE and more — each one has helped me gain deeper technical knowledge and industry credibility. But none of them, on their own, prepared me for the real challenge of leadership: translating complex security concepts into business priorities.

A few weeks ago, I spoke with a colleague who had just completed a major certification. He was feeling confident about his technical knowledge, but then he walked into a leadership meeting and was asked to explain why his team’s proposed security initiative mattered to the business. He knew the technical details inside and out, but when it came to making the case to executives—framing security as a business priority rather than a technical challenge—he struggled.

That moment made it clear: Certifications don’t prepare you for the real challenges of leadership.


The Gap Between Certifications and Real-World Leadership

Certifications focus on frameworks, methodologies, and compliance—which are important. But in the real world, professionals must be able to:

  • Translate security risks into business impact.
  • Justify IT investments in terms of ROI.
  • Persuade leadership to prioritize security initiatives.

I’ve seen too many skilled IT professionals hit a ceiling in their careers—not because they lack knowledge, but because they struggle to communicate complex ideas in a way that decision-makers care about.

For example, if you’re discussing Zero Trust security with your executive team, you need to go beyond saying,

“Zero Trust limits network access to reduce attack surfaces.”

Instead, translate that into business terms:

Zero Trust ensures that only the right people have access to critical systems, reducing the likelihood of a data breach that could cost us millions in fines and lost customer trust.

This shift in communication changes the conversation—and ultimately determines whether your initiatives get the support they need.

Three Skills Every Cybersecurity and IT Leader Needs

If you want to stand out and drive real change, focus on developing these three essential leadership skills:

1. Storytelling & Business Impact

Leaders don’t respond to jargon and technical specs—they respond to narratives that connect security to real business challenges.

  • Instead of saying: “We need to implement multi-factor authentication (MFA) to strengthen security.”
  • Say: “Over 80% of breaches come from weak passwords. MFA would immediately reduce our risk of unauthorized access, protecting both our data and our reputation.”

The difference? One statement sounds like an IT upgrade. The other sounds like a business necessity.

2. Risk-Based Decision Making

Security isn’t about eliminating all risks—it’s about prioritizing the most critical ones without disrupting operations.

  • Understand risk appetite — how much risk your company is willing to tolerate.
  • Learn how to quantify risk in dollars — leaders want to know what a security failure could cost the business.
  • Frame recommendations in terms of business value, not just security best practices.

Example: Instead of saying, “This patch reduces vulnerabilities,” explain, “This patch could prevent an outage that would cost us $50K in lost revenue per hour.”

3. Stakeholder Influence & Negotiation

Your ability to secure buy-in for security initiatives determines whether they actually get implemented.

  • Speak the language of finance, operations, and executive leadership—not just IT.
  • Identify the real drivers behind security decisions (often compliance, customer trust, or financial impact).
  • Build relationships before you need them—so when a crisis arises, decision-makers already trust your expertise.

If you can’t convince the CFO or CEO why security investments matter, even the best technology solutions will go underfunded or deprioritized.

How to Develop These Skills (Beyond Certifications)

So, how do you bridge the gap between technical expertise and executive influence?

  1. Start practicing now. Present security insights to non-technical colleagues and get feedback on clarity.
  2. Study leadership communication. Take courses on storytelling, negotiation, and business strategy.
  3. Follow cybersecurity leaders who articulate security in business terms—watch how they frame discussions.
  4. Get involved in executive-level conversations. Don’t just sit in IT meetings—engage with finance, operations, and leadership.

The professionals who stand out are the ones who combine technical depth with the ability to communicate its value to the business.


Certifications prove what you know—but your ability to connect security to business priorities is what sets you apart.

If you’re serious about advancing in cybersecurity or IT leadership, ask yourself:
Are you just learning technical frameworks, or are you preparing to lead?

Tech skills get you in the door. Communication skills put you at the table.

Are you ready for that next-level conversation?


This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8906
Approaching January 1st, 2025 https://www.wylieblanchard.com/approaching-january-1st-2025/ Mon, 30 Dec 2024 08:34:00 +0000 https://www.wylieblanchard.com/?p=8900 As we approach 2025, I’m excited to share some big goals I’ve set for myself and my business. Every November, I reflect on ways to grow, both personally and professionally, and this past November was no different. Here’s a glimpse into what I’m focusing on in 2025: Writing and Publishing My First Book This year, […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Open planner with pen and coffee on desk. The year, 2025, is written on the planner

As we approach 2025, I’m excited to share some big goals I’ve set for myself and my business. Every November, I reflect on ways to grow, both personally and professionally, and this past November was no different.

Here’s a glimpse into what I’m focusing on in 2025:

Writing and Publishing My First Book

This year, my personal goal is to write and publish my first book. Publishing a book has been a long-time aspiration of mine and is an opportunity to channel creativity, share insights, and accomplish something deeply meaningful on a personal level. As part of this, I’m applying my “5 to 10% personal development rule,” dedicating no more than 5-10% of my time and income to this project.

Here’s where I stand:

  • Exploring Content Options:
    • I’ve already drafted two books:
      • A passion project about technology careers.
      • A business-focused book targeting my ideal audience, which I’ve revised twice but may still refine further.
    • Alternatively, I may start fresh and write a completely new book that better meets the needs of my audience.
  • Publishing Insights:
    • I recently read The Nonfiction Book Publishing Plan by Karl Palachuk and Stephanie Chandler, which provided valuable insights into the self-publishing process. It also helped confirm my assumption that self-publishing my first book would likely require more time than my 5-10% rule allows.
    • To balance my time commitments, I’m leaning toward working with a hybrid publishing company for this first book. This approach will provide the structure I need while ensuring I can meet my personal and professional priorities.
    • Self-publishing is still on the table for future books once I’ve mastered the process and can dedicate more time.

Aligning Personal and Business Goals:

This year, I’ve decided to align my personal goals with my business objectives to create a stronger, more cohesive path forward. A significant shift I’ve embraced is becoming more publicly active—a step I haven’t taken in several years. By aligning my personal and professional growth, I’m taking a strategic approach to strengthen my business and personal brand:

  • Q1: Redefining my personal brand marketing strategy.
  • Q2: Increasing my public presence by participating in events and networking.
  • Q3: Developing a robust process to better engage my target audience.


I’ve also partnered with a marketing firm to fine-tune specific aspects of my business marketing. Their expertise will complement my efforts to enhance my overall strategy.

Looking Ahead

2025 is shaping up to be a transformative year. Publishing my first book—whether it’s a revised version of my current drafts or an entirely new project—will be a deeply personal milestone. By focusing on aligning my personal goals with my business strategy, I’m creating a foundation for growth and success in all areas of my life.

I’m excited about what’s ahead and grateful to have your support along the way. If you have advice, insights, or encouragement, I’d love to hear from you.

Let’s make this year one of meaningful achievements together!

Wylie Blanchard

Wylie Blanchard: Business Technology Consultant and Speaker 2023

Here are a few of my activities from 2024:

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8900
What is Artificial General Intelligence (AGI) and Why Does It Matter? https://www.wylieblanchard.com/what-is-artificial-general-intelligence-agi-and-why-does-it-matter/ Sat, 23 Nov 2024 12:13:00 +0000 https://www.wylieblanchard.com/?p=8875 Imagine an AI system that could not only assist with routine tasks but also make strategic decisions, transforming industries overnight. This is the promise of Artificial General Intelligence (AGI), a technology poised to reshape the business landscape. Unlike today’s AI systems, which excel at specific tasks like language translation or image recognition, AGI aspires to […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Two hands shaking. One human hand and one technology enhanced hand

Imagine an AI system that could not only assist with routine tasks but also make strategic decisions, transforming industries overnight. This is the promise of Artificial General Intelligence (AGI), a technology poised to reshape the business landscape. Unlike today’s AI systems, which excel at specific tasks like language translation or image recognition, AGI aspires to perform any intellectual task a human can do. Think of AGI as a machine with the ability to reason, learn, and adapt across a wide range of problems, rather than being confined to a single skill set.

AGI is often seen as the “holy grail” of artificial intelligence—a system capable of understanding, reasoning, and decision-making with the flexibility of a human mind. While the journey toward AGI began with basic machine learning and narrow AI applications, researchers now envision a future where machines can learn new tasks without explicit programming, solve complex problems autonomously, and collaborate seamlessly with humans.

How is AGI Different from Current AI?

Today’s AI systems, often called “narrow AI,” are highly effective but limited. For instance, a chatbot like ChatGPT can answer questions and generate text, but it cannot diagnose diseases or manage complex project planning. AGI, on the other hand, would integrate a broad spectrum of cognitive abilities into one system, enabling it to tackle entirely different tasks with little or no retraining. This versatility is what makes AGI a revolutionary concept.

Consider an example: Narrow AI might power an e-commerce recommendation engine that suggests products to customers. AGI, by contrast, could analyze trends, predict inventory needs, and create personalized marketing campaigns—all while adapting to real-time shifts in consumer behavior. Similarly, in the healthcare sector, AGI could provide predictive diagnostics, tailoring treatment plans for patients based on genetic data, medical history, and environmental factors.

Creating AGI, however, is a monumental challenge, requiring breakthroughs in data processing, cognitive modeling, and ethical safeguards. Predictions about AGI’s arrival vary widely. Some, like OpenAI’s CEO Sam Altman, believe AGI could emerge as early as 2025, though skeptics cite the immense technical and ethical hurdles involved.

Why Should Evolving Businesses Care?

AGI has the potential to revolutionize how businesses operate, making it a game-changer for companies looking to scale or remain competitive.

For example:

  • In healthcare, AGI could enable smaller practices to deliver personalized treatments by seamlessly integrating patient data, genetic insights, and the latest medical advancements. This could help level the playing field with larger institutions, allowing even rural clinics to offer world-class diagnostic services.
  • In education, AGI could personalize learning plans for students by analyzing individual performance data and adapting teaching methods to their needs. This would empower small educational institutions to deliver high-quality, customized learning experiences that rival those of elite schools.
  • In professional services, AGI could automate repetitive tasks such as document review or client onboarding, freeing up resources for strategic decision-making and personalized client interactions. Small accounting or consulting firms, for instance, could use AGI to analyze financial records, generate insights, and forecast trends with greater precision.
  • In non-profit organizations, AGI could dramatically enhance impact by optimizing resource allocation, streamlining volunteer coordination, and automating routine tasks like donor outreach and grant management. For example, AGI could analyze community needs, predict trends, and recommend the most effective strategies for deploying aid. This level of operational efficiency and data-driven insight would enable non-profits to amplify their reach and focus more on their mission rather than administrative burdens.

For growing businesses and organizations of all sizes, AGI represents an opportunity to achieve more with fewer resources, improving efficiency and competitiveness in a rapidly changing marketplace. As noted in McKinsey’s Technology Trends Outlook 2024, advancements in AI are increasingly driving innovation and enabling companies to break barriers, leading to new efficiencies and expanded capabilities in enterprise applications. Understanding its potential now can help businesses prepare to harness its benefits as the technology matures.

A Practical Roadmap for SMBs: Preparing for AGI

Preparing for AGI doesn’t require jumping in headfirst. Instead, businesses can begin by adopting narrow AI tools, building a foundation for more advanced AI systems in the future. Here’s a step-by-step roadmap for growing companies to get started:

1. Identify Key Pain Points

Start by identifying specific challenges within your business. Are you struggling with repetitive administrative tasks, inefficient workflows, or slow decision-making processes? Narrow AI tools, such as automation platforms or analytics dashboards, can address these issues.

2. Adopt Narrow AI Solutions

Implement AI tools tailored to your business needs. For example:

  • IT Support: Use AI-driven systems to monitor and resolve technical issues proactively.
  • Customer Engagement: Deploy chatbots to handle routine inquiries, freeing up human staff for complex tasks.
  • Data Management: Leverage analytics tools to uncover insights from customer or operational data.

An outsource IT partner can guide businesses through the implementation of these tools, ensuring seamless integration with existing systems.

3. Upskill Your Workforce

Ensure your team is prepared to work alongside AI systems by providing training and resources. An experienced technology partner can offer staffing solutions and training programs tailored to growing companies, helping teams stay ahead in an AI-driven world.

4. Optimize IT Infrastructure

Invest in scalable, cloud-based IT solutions to support future AI capabilities. A technology provider with expertise in platforms like Microsoft Power Platform can help businesses set up systems that grow alongside their needs.

5. Build a Long-Term AI Strategy

Collaborate with a technology consultant to develop a roadmap for integrating more advanced AI technologies. This includes identifying opportunities for AGI applications as they become viable.

Preparing for the AGI Era

While AGI may be years—or decades—away, evolving businesses can prepare by embracing today’s AI tools. Start experimenting with AI-powered solutions in your operations, stay informed about advancements, and consider how AGI might integrate with your existing systems in the future. By understanding its potential now, you’ll be better equipped to navigate the changes it will bring.

For companies just starting their AI journey, adopting narrow AI solutions can offer immediate benefits while laying the groundwork for future AGI integration. Automating repetitive tasks, leveraging data analytics, and upskilling teams to work alongside intelligent systems are excellent first steps.

AGI holds incredible promise, but it also raises important questions about ethics, security, and the role of humans in a world increasingly shaped by intelligent machines. It’s an exciting time to be in business as we stand on the edge of a potential revolution.

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8875
From NPD to the Cloud: Why Businesses Must Prioritize Cybersecurity Now https://www.wylieblanchard.com/from-npd-to-the-cloud-why-businesses-must-prioritize-cybersecurity-now/ Sat, 14 Sep 2024 11:24:00 +0000 https://www.wylieblanchard.com/?p=8844 The recent National Public Data (NPD) breach, which compromised the personal information of over a million individuals, serves as a stark reminder of the ever-growing need for strengthened cybersecurity measures. As organizations increasingly rely on digital platforms to store sensitive data, the importance of cybersecurity cannot be overstated. Data breaches are no longer isolated incidents—they […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Data Codes through Eyeglasses

The recent National Public Data (NPD) breach, which compromised the personal information of over a million individuals, serves as a stark reminder of the ever-growing need for strengthened cybersecurity measures. As organizations increasingly rely on digital platforms to store sensitive data, the importance of cybersecurity cannot be overstated. Data breaches are no longer isolated incidents—they have become a significant, ongoing threat to businesses and their customers. With the rapid evolution of technology, companies must prioritize the implementation of robust cybersecurity frameworks to safeguard their operations, protect consumer trust, and ensure long-term business continuity.

The NPD Breach: A Wake-Up Call for Cybersecurity

The NPD incident was a clear demonstration of how vulnerable even large, data-driven organizations can be to cyberattacks. Although the breach reportedly impacted 1.3 million individuals, some experts argue the actual scale of the compromise might be larger, considering the 2.9 billion records reportedly exposed on the dark web. This gap between the company’s official disclosure and the broader cybersecurity community’s findings highlights a recurring challenge: many organizations underestimate the extent of their vulnerabilities until it’s too late.

In the wake of such incidents, businesses must ask themselves: Are we doing enough to protect our digital assets? Data breaches like the NPD case underscore the importance of taking proactive measures to avoid devastating consequences, such as financial losses, damaged reputations, and loss of consumer trust.

Why Cybersecurity is Critical for Today’s Businesses

Businesses today operate in an increasingly complex digital landscape. From financial institutions to healthcare providers, nearly every industry depends on digital infrastructure to facilitate daily operations, communicate with clients, and store critical data. However, this reliance on technology comes with its own set of risks.

Cybercriminals are becoming more sophisticated, leveraging advanced techniques to exploit vulnerabilities in systems. They target weak spots, from outdated software to poorly configured cloud platforms, and the consequences of these attacks can be catastrophic. According to the IBM and Ponemon Institute’s 2024 Cost of a Data Breach Report, the global average cost of a data breach increased to USD 4.88 million in 2024, marking a 10% increase over the previous year. Business disruption and the costs associated with post-breach responses, such as customer support and regulatory compliance, contributed to this significant rise. For small businesses, these figures could result in bankruptcy or closure. This is why cybersecurity has evolved from a technical concern to a strategic business priority.

The Long-Term Costs of Data Breaches

Beyond the immediate financial impact, the long-term effects of data breaches can be equally damaging. Businesses may face legal repercussions, including fines and lawsuits from customers whose data has been compromised. Additionally, regulatory bodies such as the California Consumer Privacy Act of 2018 (CCPA), the state of Illinois’ Personal Information Protection Act (PIPA) or the Biometric Information Privacy Act (BIPA) can impose strict penalties for non-compliance with data protection standards.

A breach can also severely damage a company’s reputation. Consumers are increasingly aware of the importance of data security, and a company’s failure to protect their information can lead to a loss of trust. When customers no longer feel secure doing business with a company, they take their business elsewhere, further eroding the company’s market share.

Moreover, data breaches disrupt operations. Recovery efforts often involve halting production, isolating systems, and launching extensive investigations. This downtime can significantly hinder a company’s ability to serve its customers, exacerbating the damage caused by the breach.

Proactive Cybersecurity Measures

To avoid the far-reaching consequences of a data breach, organizations need to adopt proactive cybersecurity strategies. The following measures can help businesses mitigate risks and strengthen their defenses:

1. Comprehensive Risk Assessments
Businesses must regularly conduct thorough risk assessments to identify potential vulnerabilities within their digital infrastructure. These assessments should not only focus on internal systems but also include third-party vendors and partners who have access to company data. A well-rounded risk assessment allows businesses to prioritize cybersecurity investments and focus on areas that present the highest risk.

2. Multi-Factor Authentication (MFA)
A simple yet effective security measure, multi-factor authentication adds an extra layer of protection by requiring multiple forms of verification before granting access to sensitive systems. This reduces the likelihood of unauthorized access, even if a password is compromised.

3. Regular Software Updates and Patching
Cybercriminals often exploit known vulnerabilities in outdated software. Ensuring that all systems are regularly updated and patched is critical to closing these gaps. Organizations should have a clear patch management process in place, with designated personnel responsible for monitoring and implementing updates.

4. Employee Training and Awareness
One of the most common ways cyberattacks occur is through human error. Phishing schemes and social engineering tactics exploit untrained employees to gain access to sensitive information. To combat this, businesses must invest in continuous cybersecurity training programs that educate employees on the latest threats and how to recognize them.

5. Data Encryption
Encrypting sensitive data ensures that, even if a breach occurs, the stolen information is unreadable to unauthorized users. Businesses should implement encryption protocols both for data at rest (stored data) and data in transit (information being sent between systems).

6. Incident Response Planning
Having a robust incident response plan in place can help businesses quickly address and mitigate the effects of a breach. An effective plan should include clear protocols for isolating compromised systems, notifying affected stakeholders, and conducting forensic analysis to determine the scope of the breach. Regular testing of the incident response plan ensures that all team members are familiar with their roles in the event of a breach.

The Role of Cloud Security

With the shift towards cloud computing, businesses are increasingly relying on cloud providers to store and manage their data. However, cloud environments present their own unique set of challenges. Data breaches in cloud infrastructures can occur due to misconfigurations, lack of encryption, or insecure APIs. Therefore, organizations must ensure they partner with reputable cloud providers who offer robust security measures, such as encryption, regular monitoring, and adherence to industry standards.

It’s also critical for businesses to maintain visibility and control over their cloud environments. Implementing cloud security tools, such as cloud access security brokers (CASBs), can help organizations monitor and enforce security policies across cloud services. These tools offer real-time visibility into user activities, identifying potential threats before they can escalate into full-blown breaches.

Learning from the NPD Breach: The Need for Transparency

One of the lessons businesses can learn from the NPD breach is the importance of transparency. In many cases, companies are hesitant to disclose breaches until they have a complete understanding of what happened. However, this approach can delay critical responses, such as notifying affected individuals or taking action to prevent further damage.

Transparency and timely reporting are not just ethical obligations—they are also critical components of crisis management. Customers need to be informed promptly if their data has been compromised so that they can take steps to protect themselves. Moreover, regulatory agencies often require timely disclosures, and failure to comply can result in additional penalties.

The Future of Cybersecurity: Evolving with the Threats

Cyber threats are constantly evolving, which means businesses must remain vigilant and adaptive. Cybersecurity is not a one-time investment; it requires continuous updates, monitoring, and strategic planning. As artificial intelligence (AI) and machine learning (ML) become more integrated into cybercriminals’ arsenals, businesses will need to leverage these same technologies to defend against sophisticated attacks.

By adopting a forward-thinking approach to cybersecurity, businesses can stay one step ahead of cybercriminals, protecting both their operations and their customers. In today’s digital world, investing in cybersecurity is not just about avoiding breaches—it’s about building a resilient organization that can thrive in the face of adversity.


The NPD breach is a reminder that no organization, regardless of size or industry, is immune to cyberattacks. Strengthening cybersecurity requires a proactive, comprehensive approach that addresses both technological vulnerabilities and human factors. By implementing robust cybersecurity strategies, businesses can protect themselves from the ever-present threat of data breaches, safeguard their customers, and secure their future in the digital economy.

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8844
Essential Disaster Preparedness Strategies: Safeguarding Your Business https://www.wylieblanchard.com/essential-disaster-preparedness-strategies-safeguarding-your-business/ Sun, 18 Aug 2024 15:20:00 +0000 https://www.wylieblanchard.com/?p=8826 Discover essential disaster preparedness strategies for businesses, including risk assessment, disaster recovery plans, IT infrastructure investment, regular testing, and leveraging advanced technology. Ensure your business's resilience and continuity in the face of natural disasters.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Frustrated Man in Front of a Laptop

Recent tornadoes in Chicago and the surrounding suburbs have starkly highlighted the urgent need for businesses to enhance their disaster preparedness strategies. The destructive storms caused widespread power outages, significant infrastructure damage, and disrupted operations for numerous businesses. These events underscore the vulnerabilities in existing systems and the necessity for robust disaster recovery plans. Being prepared for such unforeseen events is critical to building resilience and ensuring continuity.

The recent tornadoes, which resulted in significant damage and power outages, serve as a stark reminder of the potential for natural disasters to disrupt business operations. As businesses in the affected areas work to recover, the importance of comprehensive disaster preparedness becomes evident. Ensuring that a business can withstand and quickly recover from such events is essential to maintaining operations and minimizing financial loss.

Here are some recommendations for businesses across the Midwest:

Assess and Prioritize Risks

Begin by identifying potential risks specific to the business and geographic location. The recent tornadoes, which caused extensive damage and power outages, underscore the importance of this step. Conduct a thorough risk assessment to prioritize threats based on their likelihood and potential impact on operations.

Develop a Comprehensive Disaster Recovery Plan

A robust disaster recovery plan is essential for minimizing downtime and ensuring business continuity. The plan should include:

  • Data Backup and Recovery: Regularly back up critical data and ensure that backups are stored offsite or in the cloud. This prevents data loss in the event of physical damage to premises.
  • Communication Strategy: Establish clear communication protocols to ensure all stakeholders are informed during a disaster. This includes updating contact information and having alternative communication channels in place.
  • Operational Continuity: Identify key business functions and outline procedures for maintaining these operations during disruptions. This includes having contingency plans for IT infrastructure, supply chain management, and customer service.

Invest in Reliable IT Infrastructure

Modern businesses rely heavily on technology, making IT infrastructure a critical component of disaster preparedness. Cloud services can ensure that IT systems are resilient, scalable, and secure. Important aspects include:

  • Cloud Migration: Transition critical applications and data to the cloud to enhance accessibility and reduce the risk of data loss.
  • System Redundancy: Implement redundant systems to ensure that if one system fails, another can take over without disrupting operations.
  • Cybersecurity Measures: Protect IT infrastructure from cyber threats with advanced security solutions, including firewalls, intrusion detection systems, and regular security audits.

Regular Testing and Training

A disaster recovery plan is only effective if it is regularly tested and updated. Conduct regular drills to ensure that all employees are familiar with their roles and responsibilities during a disaster. Comprehensive training programs can prepare the team for various disaster scenarios.

Leverage Technology for Enhanced Preparedness

Utilize advanced technologies to enhance disaster preparedness efforts. Solutions include:

  • Business Intelligence and Analytics: Use data analytics to monitor risks and make informed decisions during a crisis.
  • Automation Tools: Implement automation to streamline disaster recovery processes, such as automated backups and failover systems.
  • Virtual Dashboards: Access real-time information and insights through virtual dashboards that help monitor the status of business operations during a disaster.

Collaborate with Experts

Partnering with experts ensures that disaster preparedness strategies are comprehensive and up-to-date. Professionals with extensive experience in business continuity planning, IT support, and cloud services can work closely with businesses to develop customized solutions that meet unique needs.

Disasters can strike at any time, but with a proactive approach, businesses can be prepared to handle any challenge. Building resilience and ensuring continuity is essential for safeguarding business operations and minimizing financial loss.

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8826
Investing in Total Customer Experience: The Role of Document Management https://www.wylieblanchard.com/investing-in-total-customer-experience-the-role-of-document-management/ Mon, 24 Jun 2024 04:06:00 +0000 https://www.wylieblanchard.com/?p=8833 In order to address customers’ evolving preferences for digital interaction, more and more companies are seeking a digital-first strategy for document and communication management. With a digital-first approach, companies can offer customers increased speed, added convenience, and a better experience overall.  However, making the transition to digital is not always easy. In fact, while 87% […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Positive businesswoman doing paperwork in office

In order to address customers’ evolving preferences for digital interaction, more and more companies are seeking a digital-first strategy for document and communication management. With a digital-first approach, companies can offer customers increased speed, added convenience, and a better experience overall. 

However, making the transition to digital is not always easy. In fact, while 87% percent of senior business leaders say digitization is a company priority, only 40% of organizations have actually succeeded in bringing digital initiatives to scale, according to a report by Gartner

Here are the most common barriers faced by companies seeking to make a digital transition:

  • Resistance to change
  • Integration challenges
  • Cost concerns
  • Issues with security and compliance

Document management and personalization

Document management (DM) — the process of capturing, storing, and retrieving digital versions of documents that were previously paper-based — enables organizations to overcome these barriers. 

By utilizing DM tools and systems, companies can manage their digital documents while benefiting from additional security, access control, and centralized storage, plus streamlined search and retrieval options. They help reduce the risk of human error, physical damage to files, retrieval issues, and costs. 

Specifically, a digital-first DM system provides for:

  • Increased engagement — interactive and personalized digital documents drive higher consumer interaction
  • Accessibility — recipients can access documents anytime, anywhere, and on any device
  • Compliance and security — advanced digital platforms offer robust security measures, ensuring data protection and regulatory compliance

DM’s ability to drive consumer interaction via personalization is of particular interest to many organizations, as its value to consumers continues to escalate. Emarketer reports that nearly 90% of consumers now believe the experience a company provides is as important as its products or services, and 73% said they “expect companies to understand their unique needs and expectations.” Brands are primarily going to compete on customer experience in the future, and DM systems will have a big role in this.

Cost-effectiveness, consistency, and AI 

Although marketers may have initial cost concerns when making a digital transition, doing so can provide a variety of efficiency advantages. 

Companies can, for example, partner with a print service provider to utilize print-on-demand services, ensuring that only necessary documents are printed. They can implement electronic delivery (eDelivery) systems to cut down on postage and printing costs. They can also consolidate services and partners (both print and digital) to eliminate redundancy and any duplication of composition, storage, and processes.

DM’s additional advantages include:

  • Leveraging automation to reduce manual processes and associated costs
  • Consolidating document production and distribution platforms to streamline operations
  • Utilizing data analytics to optimize printing and mailing for necessary physical communications
  • Ensuring a company can realize consistency across messages while minimizing friction for customers having to provide repeat information

The onset of artificial intelligence (AI) further increases the scope of DM, empowering these new tools to serve up valuable information and insights to an organization. AI can identify document inconsistencies to ensure the data provided to and received from customers is as accurate as possible. It can also streamline information provided to customers more efficiently – building trust and brand loyalty. 

Future-proof your organization 

There’s a growing significance of DM and the urgency for digital transformation for future readiness. According to a DocuSign report, “78% of businesses consider digital transformation of document processes crucial to survival post-COVID-19.” Additionally, RRD’s Print Impact Report shows that 91% of marketers are integrating print and digital channels today, demonstrating the critical need to adapt for future success. 

How should companies ensure that their organization is ready for a digital transformation? Take these steps:

  • Anticipate and adapt to the rapidly changing evolving digital landscape
  • Embrace AI technology to make DMS investments more impactful through better data extraction
  • Invest in scalable and flexible technology platforms that support growth and change
  • Focus on cloud integration and hosting where possible to integrate into other systems 
  • Foster a culture of innovation to continuously enhance the customer experience

This content was originally posted on rrd.com

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8833
Innovating on a Budget: Strategies for Today’s Tech Leaders https://www.wylieblanchard.com/innovating-on-a-budget-strategies-for-todays-tech-leaders/ Sat, 04 May 2024 11:31:00 +0000 https://www.wylieblanchard.com/?p=8811 How do technology companies manage the continuous demand for innovation while grappling with stringent budget constraints and evolving market expectations? In 2024, firms face a relentless challenge to integrate cutting-edge technologies into new products, all while optimizing operational efficiency under financial pressures. This article explores the aspects that influence the tech world, ranging from the […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
An elegant illustration of a digital network map alongside a mechanical wheel, set against a soft, uniform background

How do technology companies manage the continuous demand for innovation while grappling with stringent budget constraints and evolving market expectations? In 2024, firms face a relentless challenge to integrate cutting-edge technologies into new products, all while optimizing operational efficiency under financial pressures. This article explores the aspects that influence the tech world, ranging from the integration of innovative technologies to the dynamics of IT spending and consumer satisfaction. By analyzing critical statistics from industry-leading surveys and reports, we uncover the challenges and opportunities that define the landscape of technology and its impact on both companies and consumers.


Integration of Technologies and Innovation Pressure

For technology-focused businesses, innovation is not just a buzzword but a survival strategy. According to the KPMG 2023 US Technology Survey, 58% of technology sector executives report that their primary challenge is the increased pressure to create new product features by integrating multiple technologies.1 This indicates a broader industry trend where the rapid pace of technological advancement is not just an opportunity but also a considerable strain.

Companies are compelled to explore and adopt a multitude of emerging technologies—ranging from AI to IoT—each promising to be the next big revolution. The integration of these technologies is not merely about keeping up with competitors but about redefining market standards and consumer expectations. The drive to innovate under pressure not only pushes companies towards technological breakthroughs but also demands a high level of agility and creativity from their leaders.

Budget Constraints and Productivity

The pressure to innovate is juxtaposed with stringent budget constraints. The KPMG 2023 Global Tech Report highlights that 65% of tech companies are expected to do more with less, with reduced budgets compared to the previous year.2 Meanwhile, the Deloitte Tech Trends 2023 report indicates that 72% of digital leaders have witnessed improvements in employee productivity due to digital transformation.3

These insights underscore a critical balance that companies must achieve—enhancing productivity without proportional increases in budgets. Leveraging technology for digital transformation presents a solution, allowing businesses to automate processes, enhance decision-making, and optimize resource allocation. The key challenge lies in strategically investing in technologies that yield the highest return on investment in terms of productivity.

Future Trends in IT Investment and AI Adoption

Despite the economic uncertainties, the technology sector continues to see optimistic investment forecasts. In its 2024 Outlook Technology Report, Deloitte predicts an 8% growth in global IT spending,4 suggesting a strong confidence in tech development’s ROI. Concurrently, Horton’s anticipates that 75% of software engineers will use AI coding assistants by 2028 in its 2024 Tech Trends report,5 signifying a shift towards more automated and sophisticated tools in software development.

This indicates not only a robust investment climate but also a transformative shift in how technology is being developed and utilized. The integration of AI tools in software engineering is set to redefine the traditional methodologies, leading to faster, more efficient, and potentially more innovative development cycles. Such trends are pivotal for tech companies aiming to lead in innovation and efficiency.

Executive Confidence and Technological Adequacy

Confidence among executives regarding their technological capabilities remains high, with 70% expressing confidence in achieving their goals using existing technologies,1 reveals a significant alignment between strategic goals and technological capabilities within organizations.

This confidence likely stems from successful past integrations of technology that have led to measurable benefits, such as increased market reach or improved operational efficiency. It also points to a maturity in the technology lifecycle where existing tools can still provide competitive advantages without immediate upgrades or overhauls. For tech leaders, maintaining this confidence requires ongoing evaluation of tech capabilities against strategic objectives to ensure they continue to align effectively.

Consumer Experience and Market Expectations

A staggering 94% of consumers report frustration with disjointed experiences when interacting with organizations.6 This statistic highlights a significant gap between technological advancements and their implementation in user-friendly ways.

Improving consumer experience is crucial, as it directly influences satisfaction and loyalty. Tech companies must therefore focus not only on the backend integration of new technologies but also on how these technologies are experienced at the consumer level. Ensuring seamless, intuitive, and cohesive interactions across various platforms and touchpoints can substantially enhance consumer perceptions and foster stronger brand connections.


The technology sector’s landscape is complex and challenging, yet ripe with opportunities for those who can skillfully navigate the pressures of innovation, budget constraints, and consumer expectations. Understanding the nuances of this dynamic—through the lens of key industry statistics—provides valuable insights into strategic decision-making. For tech leaders and companies, the goal is clear: innovate effectively, manage resources wisely, and always keep the consumer experience at the forefront of technological integration. By doing so, they can not only survive but thrive in this competitive industry.

Sources:

  1. “KPMG 2023 US Technology Survey.” KPMG, 2023,
    kpmg.com/kpmg-us/content/dam/kpmg/pdf/2023/2023-kpmg-us-tech-survey.pdf
  2. “KPMG 2023 Global Tech Report.” KMPG, 2023,
    assets.kpmg.com/content/dam/kpmg/xx/pdf/2023/09/kpmg-global-tech-report.pdf
  3. “Tech Trends 2023: Life Sciences perspective.” Deloitte, 2023,
    www2.deloitte.com/content/dam/Deloitte/us/Documents/life-sciences-health-care/us-tech-trends-2023.pdf
  4. “2024 Outlook Technology Report.” Deloitte, 2024,
    www2.deloitte.com/content/dam/Deloitte/us/Documents/technology-media-telecommunications/2024-tmt-outlook-technology.pdf
  5. “Tech Trend 2024 Report.” Horton, 2024,
    hortoninternational.com/wp-content/uploads/2024/02/Tech_Trend_2024_Report-2.pdf
  6. “2023 Digital Trends: Financial Services in Focus.” Adobe, 2023,
    business.adobe.com/content/dam/dx/us/en/resources/digital-trends-financial-services-2023/adobe-digital-trends-2023-fsi.pdf

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8811