Information Management Blog

The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

AIIM on Air  |  Information Security

[Podcast] Tips for Staying Cyber-Safe While Working from Home

Remote working comes with a number of benefits both for the employee and the employer. Employees enjoy a better work-life balance, the comfort of their home office, and can avoid the stress of a commute. Businesses can save money, improve employee retention, and more. But, new challenges also arise with the recent boom in remote working, including cybersecurity threats like ransomware, data hacking, viruses, and more. At the office, typically somebody else takes care of the cybersecurity measures. But, when employees are working remotely on their home wifi systems, it's a bit of a different story. On this episode of the AIIM on Air Podcast, we take a look at what you can do to keep your systems safe and your company and private information protected.

Read More

Blog Feature

Digital Transformation  |  Information Security  |  Paperless Office

Work from Home: 7 Best Security Practices for Remote Teams

Thanks to the internet and the connected world we live in, working remotely is increasing in popularity for a good reason! The benefits of working from home have been good for both organization and their employees. On the one hand, organizations can hire talent despite the geographical issue and provide a flexible work schedule, minimized exposure to germs, and so on! On the other hand! For employees, working from home will reduce the commuting time, empower workers in their own environments, and provide the convenience of things like virtual meetings. 40% of people say that the top benefit of working remotely is the flexible schedule. But, as people say, with great benefits, come great risks! You may already be aware of some of the risks, but likely not all of them. Organizations and employees both have their own set of risks, which can be a hurdle while working from home remotely. However, until the cure for COVID-19 is found, organizations and employees are choosing work from home to maintain the recommended social distancing practices. But, as you start your social distancing/remote working, there are certain strict and important practices that every organization will have to exercise. Are you ready to learn the best security practices for remote working that can be used both by organizations and employees for maintaining ethics and productivity? Let’s get started!  

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Compliance  |  Electronic Records Management (ERM)  |  Information Security

Data Security Begins with Content Minimization: A 3-Step Approach

Only 3 of the worst 10 data breaches of all time happened in 2019, but it was still not a good year for data security. According to CNet, the primary culprit was “unsecured database.” However, one significant contributing factor in many of them was that organizations collected and retained data they generally didn’t need – and if they did, they didn’t need to retain it as long as they had.

Read More

Blog Feature

Artificial Intelligence (AI)  |  Information Security  |  Privacy

Regulation of AI-Based Applications: The Inevitable New Frontier

According to the 2019 IDC study of spending on Artificial Intelligence (AI), it's estimated to reach $35.8 billion in 2019 and is expected to double by 2022 to $ 79.2 billion representing an annual growth rate of 38% for the period 2018-2022. The economic benefits and utility of AI technologies are clear and compelling. No doubt, applications of AI may address some of the most vexing social challenges such as health, the environment, economic empowerment, education, and infrastructure. At the same time, as AI technologies become more pervasive, they may be misused and, in the absence of increased transparency and proactive disclosures, create ethical and legal gaps. Increased regulation may be the only way to address such gaps.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

Mitigating Third Party Risks Under GDPR

One of the most vexing problems for organizations is mitigating GDPR compliance risks when dealing with third parties, particularly the nature and extent of obligations between data controllers and processors. By virtue of the GDPR accountability principle, organizations are required to adhere to the six fundamental principles of safeguarding privacy rights that impact the collection, processing and disposition of personally identifiable information. These obligations extend beyond the walls of an organization to third parties that process personally identifiable information. Also, GDPR provides for a broad definition of processing and imposes stringent requirements on organizations that engage third parties to process personally identifiable information.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

The Tension between GDPR and Blockchain: Are they Polar Opposites or Can they Co-exist

A potentially problematic challenge for industry and legislators is the apparent tension between privacy rights and the rapid adoption of blockchain-based applications which are expected to reach $10.6 billion in revenue by 2023.

Read More