“In the end, the Party would announce that two and two made five, and you would have to believe it. It was inevitable that they should make that claim sooner or later: the logic of their position demanded it.” – 1984 by George Orwell

Years ago, more than I would like to admit, I was tasked with reading 1984 by George Orwell in high school, and at the time, I thought it was a good science fiction novel but I remember thinking there was no way that any of this would ever happen… today I feel differently and no, this is not a political post.

We are living in an interesting and dangerous time where fact and fiction intertwine, and the majority of people are not willing to challenge what they hear and see, and it is no different when using technology. Today, technology will show you more data than any time in our history but now it not only shows you what you want to see, it also doesn’t always show you what you should see. With the introduction of AI, we are now giving technology more control and more of our trust. These shiny bells and whistles dazzle the eyes, but did we ever stop to think that it may also be harnessing everything you give it and using it for undisclosed reasons?

Distraction is as old as time and Aesop wrote many fables to help us understand it. In one fable, a crow has found a piece of cheese and retired to a branch to eat it. A fox, wanting it for himself, flatters the crow, calling it beautiful and wondering whether its voice is as sweet to match. When it lets out a caw, the cheese falls and is devoured by the fox.

Technology can be a game-changer but also requires that each of us understand why and how it is working for us. In recent months I have intently learned about some of the technology being used in our industry and in many ways the fox is still at work. What happens to your information outside of being used to provide the service offered? Who has access to it? What are they using it for? How are they protecting it? Did you ever give permission for any of it to happen?

Corporate Cost Control’s systems and technology are secure tools that help us to provide our services, nothing more. Your data is only used for its intended purpose in providing our services, it is encrypted during transit, and at rest, it is never shared or sold without your permission, and no portion of our services are outsourced. Our technology allows you transparency and the ability to use your data for actionable purposes with no ulterior motives and the strictest adherence to our SOC2 Type II controls. We can prove this is true and we will put it in writing… will your service provider do the same?


Contact CCC to see how we can save your organization time and money.
Contact our Sales Team
(800) 207-6926

Featured Videos

View All Videos

Latest News

Close

Sales

Your Name:*

Title:

Company Name:*

Company Address:

Company City:

Company State:

Company Zip:

Number of Employees:

Your Email:*

Phone Number:*

Fax Number:

Check the boxes below if you wish to receive information on any of the following:

Unemployment Cost ControlTax Credits & Incentives (WOTC)Employment / Wage Verification

Your Message:

Employment & Income Verfication

Your Name:*

Title:

Company Name:*

Company Address:

Company City:

Company State:

Company Zip:

Number of Employees:

Your Email:*

Phone Number:*

Fax Number:

Your Message: