The AIIM Blog
Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.
GDPR | Information Security | Privacy
Resistance is futile. A recent Gartner report estimates that by 2020 the number of connected devices such as sensors and wearables will reach 21 billion, up from 6.4 billion in 2016. Such an unprecedented level of connectedness is expected to transform virtually every facet of our lives, largely in beneficial ways.
Share
GDPR | Information Security | Privacy
The case for more rigorous cybersecurity and the protection of personally identifiable information is compelling. Consider the following facts: The Identity Theft Resource Center found that data breaches have increased 40% from 2015 to 2016, reaching an all-time high of 1,093 in the US alone; and, The average cost per breach in 2016 is pegged at $4 million, up 29% from the year prior.
Share
Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.
Information Security | Sharepoint and Office 365
For the past many years, I’ve been focused on creating better, easier, and more reliable ways of gathering information. I learned early on that we had to give some incentives to people if we wanted them to cooperate without information gathering efforts. If we could improve a process that was still somewhat manual, for example, we could encourage people to put stuff in SharePoint. If we could move some of that content to SharePoint Online, making access easier and more dependable, we might further encourage people to use the platform. Still, the bulk of our energy was being spent on collecting, identifying, and processing the information on its way into permanent storage.
Share
Capture and Imaging | Information Security
Organizations are receiving more information than ever from more sources than ever, and they're being asked to push that information faster than ever to more corners of the organization than ever. It's no surprise that crooks and fraudsters, whether they're inside your organization or outside their organization, are looking for ways to get at that information for nefarious purposes.
Share
Compliance | Information Security | Privacy
The disclosures this week from Yahoo, about government access to private emails, have fueled another round of discussions about the role of privacy and security in an internet/social age. One of the issues that I think is not fully understood about this issue – especially in the U.S. – is the fundamentally different perspectives about privacy that exist in Europe, and how those differences then manifest themselves into policy.
Share
Today’s workforce is increasingly distributed, increasingly mobile, and increasingly expecting telework options. This equates to more people working beyond the corporate walls and beyond the corporate IT firewall. But how can organizations offer such flexibility without losing control of their information?
Share