Home /Result for tags: "Records management | security"
Jan. 27 2015
Cybercrime targeting of commercial enterprises and organizations is rampant. Increasingly sophisticated, organized crime groups are gaining improper access to point-of-sale systems and corporate networks... View More
May 25 2010
Diversified Information Technologies, Inc. (Diversified), a leading provider of document and information lifecycle solutions, announced its eChart-Rx solution, a suite of medical records management and... View More
Aug. 18 2014
Information governance, as an industry, has been maturing and coming to the forefront at many leading organizations. I’ve had the opportunity to see much of this maturation at various organizations... View More
Oct. 30 2014
Here we are in October already, a month known for tricks, treats and scary things lurking about waiting to frighten you. While it is a time for fun and social interactions, it is not a time you want to... View More
Aug. 3 2009
The financial crisis, which presented a massive blow to the banking and capital markets sectors, now presents an opportunity for a profound change. Leading up to the credit crisis, the financial services... View More
Feb. 14 2014
The shifting boundaries between work and home life mean staff at many small businesses are unwittingly putting their employers at risk of cyber-attack. 82% of small business employees use work time for... View More
Aug. 15 2013
By now, many are aware of the staggering increases in electronically stored information (ESI). Pundits and consultants often use colorful analogies to emphasize these remarkable numbers. Obscure terms... View More
Dec. 2 2013
On August 24, 2012, President Obama issued a memorandum regarding the management of government records, citing the need for reformation of the policies, practices and framework that would bring about a... View More
May 12 2011
Organizations depend on information to manage day-to-day operations, comply with regulations, gauge financial performance, and monitor strategic initiatives. This critical information resides in the organization's... View More
June 9 2015
In a recent conversation with a vice president, he threw his hands up in frustration as he told me how exasperated he was trying to figure out the cause of a customer crisis. He pointed at his email screen... View More
April 16 2013
An information management policy clearly lays out what kind of data should be kept, what kind should be deleted and establishes a sound, objective method to apply to company-wide data. So, how do you get... View More
Jan. 28 2010
The growth of email use in business has ballooned over the past decade, and knowledge workers today send and receive more than 25,000 email messages per year, a burdensome volume in many ways. Studies... View More
Oct. 29 2014
Thinking about mobile security keeps me up at night. It probably keeps you up too. On a recent evening, I was browsing the findings of a study by McAfee and Ponemon Institute titled “The Lost Smartphone... View More
March 10 2015
Pretty much every month, as regular as clockwork, I get a short message service (SMS) text from the same organization. This organization is located in a city that is a several-hour drive from where I live... View More
Aug. 10 2015
For information technology (IT) security managers, bring your own device (BYOD) is a four-letter acronym guaranteed to strike fear into their hearts by conjuring up visions of a data proliferation doomsday,... View More
June 27 2013
Due to its rapidly growing use throughout the enterprise, social media has become a key focal point for management and boards of directors seeking to understand, assess, manage and mitigate the risks associated... View More
July 14 2014
In a recent issue of The Bulletin, we discuss Protiviti’s future auditor vision. This is something about which I am particularly passionate, as I think it speaks on many levels to how internal audit... View More
June 10 2015
Cloud Labs Kft announces that Cloudifile, its free cloud file encryption client software, launches a Mac OS Beta today. Cloudifile automatically encrypts data for secure cloud-sharing and local file storage.... View More
Sept. 20 2010
Pitney Bowes Management Services, Inc. (PBMS), a wholly owned subsidiary of Pitney Bowes Inc. (NYSE: PBI) has established a strategic reseller agreement with IMERGE Consulting to support PBMS consulting... View More
Jan. 13 2015
What do JPMorgan Chase, Home Depot, Target, Adobe, TJX and Sony all have in common? They have all been hacked and have given up tens of thousands or millions of records containing credit/debit cards, email... View More