Information Management Blog

The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

Artificial Intelligence (AI)  |  Data Management  |  Information Governance  |  Information Security

AI Readiness Assessment: Preparing Your Organization's Unstructured Data for the Future

I recently had the pleasure of hosting a conversation with Rob Bogue, the core author of AIIM's new resource "Organizational Readiness for Generative AI: Leveraging Unstructured Data for Success." This assessment focuses on how to prepare unstructured data for AI implementation. In this blog post, I'll share key insights from our discussion and highlight the importance of this tool for information management professionals.

Read More

Blog Feature

Artificial Intelligence (AI)  |  Information Security

Data Privacy in the Age of AI

Data privacy and Artificial Intelligence (AI) are two of biggest issues in the information spaces today. However, despite the enormous amount of coverage they receive in the trade and general media, what is not yet well understood is how tightly intertwined they are, and how risky it can be to address them without a proper foundation. Here are a few points to ponder to help you avoid the most common risks.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Information Security

Proactively Protecting Your Sensitive Information for Remote Workers

The unprecedented COVID-19 pandemic has, almost overnight, forced many organizations to modify their business practices and transition to a remote workforce. Of course, the first focus during this transition is deploying the connectivity and infrastructure necessary to support your remote workers. Don’t, however, lose sight of the fact that information scattered across a dispersed workforce can significantly raise the risk of a data breach or other security concerns.

Read More

Blog Feature

AIIM on Air  |  Information Security

[Podcast] Tips for Staying Cyber-Safe While Working from Home

Remote working comes with a number of benefits both for the employee and the employer. Employees enjoy a better work-life balance, the comfort of their home office, and can avoid the stress of a commute. Businesses can save money, improve employee retention, and more. But, new challenges also arise with the recent boom in remote working, including cybersecurity threats like ransomware, data hacking, viruses, and more. At the office, typically somebody else takes care of the cybersecurity measures. But, when employees are working remotely on their home wifi systems, it's a bit of a different story. On this episode of the AIIM on Air Podcast, we take a look at what you can do to keep your systems safe and your company and private information protected.

Read More

Blog Feature

Information Security

Work from Home: 7 Best Security Practices for Remote Teams

Thanks to the internet and the connected world we live in, working remotely is increasing in popularity for a good reason! The benefits of working from home have been good for both organization and their employees. On the one hand, organizations can hire talent despite the geographical issue and provide a flexible work schedule, minimized exposure to germs, and so on! On the other hand! For employees, working from home will reduce the commuting time, empower workers in their own environments, and provide the convenience of things like virtual meetings. 40% of people say that the top benefit of working remotely is the flexible schedule. But, as people say, with great benefits, come great risks!

Read More

Blog Feature

Electronic Records Management (ERM)  |  Information Security

Data Security Begins with Content Minimization: A 3-Step Approach

Only 3 of the worst 10 data breaches of all time happened in 2019, but it was still not a good year for data security. According to CNet, the primary culprit was “unsecured database.” However, one significant contributing factor in many of them was that organizations collected and retained data they generally didn’t need – and if they did, they didn’t need to retain it as long as they had.

Read More