According to Gemalto, a leader in digital security, more than one billion data records were breached in 2014, and 60 Minutes correspondent Bill Whitaker went so far as to deem 2014 “the year of the... View More
According to research and analysis from McKinsey & Company, a survey of 38 life, 33 property-and-casualty (P&C) and nine health insurers revealed that the top-performing (top-quartile) insurers' operating... View More
We know there are risks of data loss and data breaches by external hackers and fraudsters. We see this reported daily. While this is of concern, it is the internal threat of theft by staff or ex-staff... View More
Shared drive remediation is a crucial activity for effective information governance (IG). IG helps to lower risks and costs by significantly reducing data volumes and providing accessibility and structure... View More
Many of us, at some point in our lives, have decided that something must change, and usually, the beginning of a new year is a traditional time to be focused on that change. Some will decide to go to the... View More
On April 29, 2015, Chief Justice John Roberts sent Congress a package amending 11 rules to the Federal Rules of Civil Procedure (FRCP)—rules that dictate trial procedures in federal district courts... View More
Advances in technology are driving business change at an ever-increasing speed, and electronic signatures are a key example of one of those technologies. By enabling a true digital business process by... View More
As Thomas Jefferson once said, “With great risk comes great reward.” The race toward competitive differentiation calls for organizations to be bold, but at what cost? In business, we must understand... View More
Just look at the news and you see reports of data breaches, ranging from retail stores to major corporations and, yes, even government agencies. The type of information that is personally identifiable... View More
Many areas of research that we conduct within our business applications practice at 451 Research are becoming predicated upon data-driven principles, from managing advertising spend, matching consumers... View More
A very dear Singaporean friend of mine taught me Wayne Gretzky’s saying, "A good hockey player plays where the puck is. A great hockey player plays where the puck is going to be." This is great food... View More
The phrases “digitizing your business” and “digital business” are becoming increasingly common, but they are admittedly a bit broad. What does a digital business even look like,... View More
DOCUMENT Strategy Forum ’16 is pleased to announce that HP Exstream, GMC Software, Adobe, 4Point, Kofax and Canon Solutions America have signed on as corporate sponsors of its May 10-12 event, taking... View More
Last month, I discussed the general parameters of a shared drive cleanup (remediation) and some of the problem areas you may face. This month, I’ll walk through a typical remediation decision tree... View More
During the advent of the modern information technology age, Microsoft Outlook was the top communications tool. It organized everything from emails, contacts and calendars to managing our daily lives by... View More
Kodak Alaris is partnering with Google to make it easier for users to connect to document scanning devices from any type of computing environment—mobile, desktop or cloud—by taking advantage... View More
In today’s ever-changing market, some previous best practices for document management are now obsolete while others are emerging as the new normal. From testing disaster recovery plans to rethinking... View More
Well, another year has passed. For some, it was too quick, and for others, not soon enough. As we prepare for 2016, it is a good time to start, or increase, our way of thinking multidimensionally. This... View More
This past May, I had the privilege of attending the 2015 DOCUMENT Strategy Forum. As always, the event provided excellent insight on the future of documents and communications. However, as I sat in on... View More
In 2013, the National Archives and Records Administration (NARA) issued guidance to federal agencies for a simplified approach to managing email, known as the “Capstone” approach. The intent... View More