
[
	{
		"post_id": "267", 
		"post_category_id": "48", 
		"post_title": "Jidoka: Automation with a Human Touch, A Software Method to Gain Organisational Control", 
		"post_content_short": "The Journal of Software and Systems Modeling published paper offers organisations a path to escape the legacy trap.", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/267\/Eban-Jidoka-cover-(1).png", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/insights\/newsroom\/jidoka-automation-with-a-human-touch-a-software-method-to-gain-organisational-control\/", 
		"post_date": "2025-07-10 21:00:00"
	}, 
	{
		"post_id": "251", 
		"post_category_id": "3", 
		"post_title": "Top 8 IT Consulting Trends for 2025", 
		"post_content_short": "IT consulting in 2025 is driven by trends like AI integration, edge computing, and quantum advancements, helping businesses streamline\n\toperations, enhance security, and adopt sustainable practices. By staying ahead of these innovations, consultants empower organisations to\n\tremain competitive, adapt to challenges, and leverage emerging technologies for growth.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/251\/Blog-Covers-(1).png", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/top-8-it-consulting-trends-for-2025\/", 
		"post_date": "2025-01-13 14:00:00"
	}, 
	{
		"post_id": "26", 
		"post_category_id": "3", 
		"post_title": "Why Legacy Systems are a Data Breach Danger", 
		"post_content_short": "Legacy systems, crucial to many organisations, pose significant cybersecurity risks due to outdated technology, lack of modern security\n\tfeatures, and difficulty integrating with current security tools. These systems often run unsupported software, making them easy targets for\n\tcyber-attacks. Their complexity and reliance on outdated authentication methods exacerbate the risk. Recent breaches underscore the need for\n\torganisations to modernise their systems and adopt advanced security measures to protect sensitive data and stay competitive.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/26\/15.png", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/why-legacy-systems-are-a-data-breach-danger\/", 
		"post_date": "2024-04-17 05:58:00"
	}, 
	{
		"post_id": "191", 
		"post_category_id": "3", 
		"post_title": "How to De-Risk and Deliver a Multi-Year IT Project", 
		"post_content_short": "To de-risk and deliver multi-year IT projects, it’s crucial to embrace flexibility, transparency, and early feedback. Agile methodologies,\n\twhich focus on launching early with essential features, play a key role in managing risks. Success also hinges on stakeholder engagement,\n\tadaptive governance, transparent contracting, and automation. Regular feedback, open communication, and trust among teams and clients are\n\tfundamental to overcoming challenges and ensuring project success in 2024’s complex IT landscape.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/191\/success_beggav.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/how-to-de-risk-and-deliver-a-multi-year-it-project\/", 
		"post_date": "2024-01-01 04:44:00"
	}, 
	{
		"post_id": "181", 
		"post_category_id": "3", 
		"post_title": "Adopting a AAA approach to software security", 
		"post_content_short": "In 2024, WorkingMouse adopts a AAA approach to software security, focusing on authentication, authorisation, and auditing to safeguard user\n\tdata. This layered defence incorporates modern methods like two-factor authentication, biometric verification, and session auditing to\n\tdetect and prevent cyber threats. Additionally, with the rise of zero trust architecture, continuous monitoring and verification ensure both\n\tinternal and external users are scrutinised, providing robust protection against evolving cyberattacks.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/181\/Speed_of_software_blog_header_image_qkp4yi-1.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/adopting-a-aaa-approach-to-software-security\/", 
		"post_date": "2024-01-01 03:48:00"
	}, 
	{
		"post_id": "230", 
		"post_category_id": "3", 
		"post_title": "What is OpenID Connect and How Does it Work?", 
		"post_content_short": "OpenID Connect (OIDC) is an identity layer built on top of the OAuth 2.0 protocol, used for secure identity management. It allows\n\tapplications to verify a user’s identity without directly handling user accounts, simplifying authentication and enhancing security,\n\tespecially in microservices architectures. The process involves user authentication via a server, code and token exchanges, and access to\n\tuser information using tokens. OIDC’s flexibility and secure token-based approach make it a key tool for managing identities in modern\n\tapplications in 2024.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/230\/OpenIDConnect_mj43kt.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/what-is-openid-connect-and-how-does-it-work\/", 
		"post_date": "2024-01-01 00:46:00"
	}, 
	{
		"post_id": "223", 
		"post_category_id": "3", 
		"post_title": "Which Payment Gateway to Consider for your Application", 
		"post_content_short": "A payment gateway acts as a secure intermediary between businesses and banks, managing transactions while ensuring compliance with payment\n\tdata standards. When choosing a gateway, consider factors like ease of integration, support for mobile payments, and transaction fees.\n\tCommon options include eWay, Stripe, Pin Payments, and Braintree, with pricing around 1.5-1.75% per transaction plus a small flat fee. It’s\n\tessential to start the approval process early and choose a gateway that meets both your technical and commercial needs for success in 2024.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/223\/blog-payment-gateways-to-consider-banner.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/which-payment-gateway-to-consider-for-your-application\/", 
		"post_date": "2024-01-01 00:18:00"
	}, 
	{
		"post_id": "215", 
		"post_category_id": "3", 
		"post_title": "The Power of a Bimodal IT Model", 
		"post_content_short": "Bimodal IT, which separates development into two modes—Mode 1 for stability and predictability, and Mode 2 for agility and\n\tinnovation—remains essential in 2024 for balancing legacy systems with modern advancements. Mode 1 focuses on reliable, structured\n\tprocesses, while Mode 2 emphasises exploration and rapid development. At WorkingMouse, we leverage the bimodal model to ensure stability for\n\tcustomers while driving innovation through agile projects. Integrating both modes collaboratively helps organisations adapt quickly to\n\tmarket demands while maintaining operational stability.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/215\/The-Power-of-Bimodal-Development_1.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/the-power-of-a-bimodal-it-model\/", 
		"post_date": "2023-12-31 23:14:00"
	}, 
	{
		"post_id": "210", 
		"post_category_id": "3", 
		"post_title": "The Benefits of Owning Your Software's Intellectual Property", 
		"post_content_short": "Owning your software’s intellectual property (IP) is crucial for full control over its use and distribution. Copyright law ensures that,\n\tunless explicitly stated in a contract, developers or companies retain ownership of the software they create. By securing IP through\n\temployment and service agreements, you gain exclusive rights to make copies, publish, adapt, and commercially license your software. Without\n\tthis, you risk losing control over your product, limiting its potential revenue or resale opportunities.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/210\/software-ip_rqq3fo.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/the-benefits-of-owning-your-softwares-intellectual-property\/", 
		"post_date": "2023-12-31 22:47:00"
	}, 
	{
		"post_id": "204", 
		"post_category_id": "3", 
		"post_title": "Securely Building AI That Builds AI", 
		"post_content_short": "Artificial Intelligence (AI) raises philosophical and ethical questions, especially around its deep learning capabilities, which mimic human\n\tbrain processes. While AI’s potential for efficiency is significant, concerns about bias, unintended workarounds, and the ability to switch\n\toff autonomous systems remain. As AI evolves, ongoing discussions and research aim to mitigate risks and ensure safe advancements. Though\n\tthese technologies are still in early stages, we must prepare for their future impact.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/204\/blog-images-may_2_zcqwdc-1.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/securely-building-ai-that-builds-ai\/", 
		"post_date": "2023-12-31 22:15:00"
	}, 
	{
		"post_id": "203", 
		"post_category_id": "3", 
		"post_title": "5 Risks You Need to Know When Building Software", 
		"post_content_short": "Building software in 2024 comes with various risks like scope creep, productivity issues, employee turnover, technical challenges, and\n\texternal factors. Mitigating these risks involves clear communication, effective planning, and using agile methodologies to stay on track.\n\tEmploying the PRINCE2 Risk Management Approach—identifying, assessing, planning responses, implementing, and communicating—helps manage\n\trisks proactively throughout the project. By preparing and monitoring these risks, you can ensure a more successful software development\n\tprocess.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/203\/5Risks_AppDev_ckruqm.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/5-risks-you-need-to-know-when-building-software\/", 
		"post_date": "2023-12-31 22:11:00"
	}, 
	{
		"post_id": "37", 
		"post_category_id": "3", 
		"post_title": "The Four Golden Signals of Monitoring", 
		"post_content_short": "At WorkingMouse, we focus on the Four Golden Signals—latency, traffic, errors, and saturation—to monitor and optimize system performance.\nThese metrics, part of Site Reliability Engineering (SRE) practices, help us maintain stability, identify issues early, and enhance user\nexperience. By integrating these signals into our DevOps reports, we ensure high reliability and performance, prevent downtime, and support\neffective resource management and security.", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/37\/27.png", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/the-four-golden-signals-of-monitoring\/", 
		"post_date": "2023-12-22 01:37:00"
	}, 
	{
		"post_id": "41", 
		"post_category_id": "3", 
		"post_title": "WorkingMouse Achieves ISO 27001 Accreditation", 
		"post_content_short": "WorkingMouse has achieved ISO 27001 certification, underscoring our commitment to top-tier data security and reliability. ISO 27001 is a\n\tglobal standard for information security management, ensuring the protection of data, compliance, and risk mitigation. This accreditation\n\tenhances customer trust by demonstrating our rigorous security practices and adherence to high standards. For more details on our commitment\n\tto security, check out our ISO 27001 certification announcement.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/41\/31.png", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/workingmouse-achieves-iso-27001-accreditation\/", 
		"post_date": "2023-11-03 01:54:00"
	}, 
	{
		"post_id": "43", 
		"post_category_id": "3", 
		"post_title": "Strengthening the Weak Links - Legacy Systems", 
		"post_content_short": "Legacy systems can pose significant cybersecurity risks due to outdated technology, lack of vendor support, and insufficient security\nfeatures. These systems often face challenges like security vulnerabilities, obsolete authentication methods, and inadequate monitoring. A\npractical solution is the like-for-like replacement, where old systems are replaced with updated versions that perform the same functions.\nAdditionally, future-proofing strategies, such as risk assessments, data preservation, cloud solutions, and regular audits, are crucial for\nmaintaining security during the modernization process. For more on how we handle legacy system upgrades, check out our work with the\nDepartment of Defence.", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/43\/32.png", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/strengthening-the-weak-links-legacy-systems\/", 
		"post_date": "2023-10-18 02:04:00"
	}, 
	{
		"post_id": "46", 
		"post_category_id": "3", 
		"post_title": "Securing the Future - Decoding ISMS", 
		"post_content_short": "In today's world, safeguarding information and ensuring business continuity is crucial due to rising security breaches, with estimated risks\nreaching USD 5.2 trillion between 2019 and 2023. An Information Security Management System (ISMS) helps protect sensitive data and ensures\nbusiness continuity by systematically addressing security risks. ISO 27001 is a key international standard for establishing and maintaining\nan ISMS, offering a framework for documentation, audits, and continuous improvement. It provides benefits such as data protection,\nregulatory compliance, business continuity, and adapting to emerging threats. ISO 27001 is crucial for any organization, regardless of size\nor industry, to manage cyber risks effectively and maintain information security.", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/46\/35.png", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/securing-the-future-decoding-isms\/", 
		"post_date": "2023-10-02 02:17:00"
	}, 
	{
		"post_id": "131", 
		"post_category_id": "3", 
		"post_title": "Complexity Multipliers: What’s Increasing the Risk of Your Software Project", 
		"post_content_short": "Speed to market is crucial, but adding complex features can extend development time. Key functionalities that increase complexity and risk\ninclude offline sync, third-party integrations, advanced security, multitenancy, dynamic reporting, and multi-platform support. At\nWorkingMouse, we factor in these complexities and associated risks in our time estimates to avoid missed deadlines and budget overruns.", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/131\/FebBlog_2_Title-Banner.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/complexity-multipliers-whats-raising-software-project-risk\/", 
		"post_date": "2020-03-13 01:11:00"
	}, 
	{
		"post_id": "130", 
		"post_category_id": "3", 
		"post_title": "Dealing with Risk When Using Agile to Develop Software", 
		"post_content_short": "Risk is unavoidable in software development, but managing it effectively is crucial. At WorkingMouse, we use the \"Cone of Uncertainty\" to\nunderstand and mitigate risk by breaking projects into smaller, manageable builds. This approach helps us keep estimates accurate and\nreduces overall project risk. We also use \"tech spikes\" to allow time for research and testing of high-risk tasks before they’re fully\nestimated. By incorporating these practices, we manage uncertainties better and keep projects on track.", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/130\/starting-with-the-problem-banner-3_1.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/dealing-with-risk-when-using-agile-to-develop-software\/", 
		"post_date": "2019-11-07 01:05:00"
	}, 
	{
		"post_id": "83", 
		"post_category_id": "3", 
		"post_title": "SafeWorkPro and WorkingMouse Innovating the Safety Industry", 
		"post_content_short": "Steve Cole founded SafeWorkPro to address inefficiencies with paper-based safety documents in Cole Contracting, where managing risk\nassessments was cumbersome and time-consuming. SafeWorkPro digitalizes workplace safety paperwork, significantly improving productivity and\ncompliance. Partnering with WorkingMouse, SafeWorkPro developed a user-friendly app, now with over 20 versions, incorporating features like\ndashboards, geotagging, and push notifications. This collaboration showcases WorkingMouse’s Codebots Platform, enhancing data collection and\nuser engagement, and supports SafeWorkPro’s growth with over 50 active users.", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/83\/Customer-Story-WorkingMouse-and-SafeWorkPro_website-2.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/safeworkpro-and-workingmouse-innovating-safety-industry\/", 
		"post_date": "2018-11-18 23:05:00"
	}, 
	{
		"post_id": "138", 
		"post_category_id": "3", 
		"post_title": "Why Picking the Right SaaS Vendor Is So Important for Cloud Security", 
		"post_content_short": "As cloud computing becomes more popular, understanding its security implications is crucial. Unlike traditional IT, cloud security relies\nheavily on choosing a reliable SaaS provider, as cloud environments expose data to unique risks. SaaS vendors are responsible for securing\ndata, including handling backups and subcontracting issues. Despite these risks, cloud computing offers significant benefits if managed\ncorrectly. To maximize security, thoroughly research and select reputable SaaS vendors, and ensure they implement robust protection\nmeasures.", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/138\/Why-Picking-The-Right-SaaS-Provider-Is-So-Important-For-Cloud-Security_website.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/why-picking-the-right-saas-vendor-is-so-important-for-cloud-security\/", 
		"post_date": "2016-07-22 02:11:00"
	}, 
	{
		"post_id": "70", 
		"post_category_id": "3", 
		"post_title": "Safety First: Overcoming Cloud Computing Security Threats", 
		"post_content_short": "Cloud services offer significant benefits like reduced costs and improved access but face skepticism due to security concerns. Many IT\n\tleaders worry about cloud security, fueled by high-profile data breaches like Equifax’s. Key challenges include ensuring data security,\n\tintegrity, and confidentiality in the cloud. SaaS providers must implement robust security measures, such as two-factor authentication and\n\tregular security assessments, to protect user data. Despite these risks, with proper precautions, the advantages of cloud computing can\n\toutweigh the drawbacks.\n", 
		"post_icon": "https:\/\/www.workingmouse.com.au\/media\/website_posts\/70\/Safety_First_Overcoming_Cloud_Computing_Security-Threats-social_codebots-blog-lrg.webp", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.workingmouse.com.au\/blogs\/safety-first-tackling-security-threats-in-cloud-computing\/", 
		"post_date": "2016-05-09 04:43:00"
	}
]