• Claims comes to terms with a hybrid working world

    time by Graham Sheppard time Jun 15, 2022
    At DOCOsoft, our whole philosophy revolves around enabling claims people to focus on those aspects of their roles where they add the most value – and applying technology to take care of all the bits in between and to maximise claims people’s ability to add that value rapidly, efficiently, and with all the relevant data at their fingertips.

    Read Full Story
  • The power of Claims Process Mining

    time by Graham Sheppard time Jun 10, 2022
    Claims is never going to be a profit centre, but an effectively managed and resourced claims team can play a vital part in boosting an insurance or reinsurance company’s efficiency – and ultimately its ability to deploy its resources to maximum effect and so operate more profitably.

    Read Full Story
  • Surfing the DevOps New Wave Adopters

    time by Andrew McCormack time May 10, 2022
    Insurance technology is constantly getting better and stronger. Yet people continue to make simple mistakes that can undermine the best laid plans of developers and IT men and women. That means there will always be the potential for threat actor to attempt ‘brute force’ systems attacks to try and find passwords. Because technology is becoming more sophisticated, they can do that quicker.

    Read Full Story
  • The Five Steps to Create an Agile DevOps Workforce

    time by Andrew McCormack time May 05, 2022
    DevOps adoption in the insurance industry is becoming increasingly important as Insurtech disruptors increase the potential threat to Lloyd’s Managing Agents and other London market carriers. At DOCOsoft, we believe that DevOps adoption can be one of the key pillars for bringing this new, modern approach into an organisation.

    Read Full Story
  • The Silent Cyber Terror

    time by Graham Sheppard time Apr 27, 2022
    Terror is typically more narrowly defined than war, but Westlaw, a Thomson Reuters company, said in a note last week that "cyber terrorism" is sometimes defined "quite broadly to include any attack against a computer system with the 'intent to cause harm' in furtherance of 'social, ideological, religious, economic, or political objectives'".

    Read Full Story

Back to top