The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

Capture and Imaging  |  Information Security

Four Safeguards You Can Take to Protect Your Information

A typical document imaging system is creating four major vulnerabilities that substantially increase the potential for data theft and violations of information management regulations: Not encrypting the data while it's in motion. Unsecured log files. Poor visibility into operator activities. Poor security management. New technology can help mitigate the above risks. I'm not here to sell you a system, I'm here to sell you an approach to a system. I'm telling you that if you're sitting on years old document scanning system, you're probably at risk, and it's time for you to look for a system. Get out your legal pad. Get out your pen and get ready to write down the four things I'm about to tell you to look for in a new document scanning system.

Read More

Blog Feature

Capture and Imaging  |  Information Security

4 Risks from Antiquated Document Capture Systems

Despite all of the investments you're making at the macro level, despite all the efforts that your IT department is doing on your behalf, there's a gap in your information security systems, and it is in the unlikeliest of places - your document scanning and data capture systems. Your information on-ramp is leaving you vulnerable to the bad guys. A typical document imaging system is creating four major vulnerabilities that substantially increase the potential for data theft and violations of information management regulations.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Capture and Imaging  |  Information Security

Increasing Security and Compliance Concerns for Document Capture

Think your scanned images are safe? Think again! As we begin 2016, the biggest threat to your business probably isn't the proverbial competitor down the street. It's someone who wants to take advantage of your corporate information. We know that a growing number of businesses and government entities have already become cyber war victims.

Read More

Blog Feature

Information Security  |  Privacy

Apple and ISIS and the FBI, Oh My

Well. Who would have ever thought that people would EVER pay attention to privacy? I’ve been constantly amazed to see revelation after revelation over the past few years greeted with a bit of a collective shoulder shrug, and then on with business as usual. I guess now, with Apple’s situation, the cat is out of the bag. Before any of this broke, I published an article on privacy that might be of interest - Does the Privacy of Your Personal Information Worry You?, and also did the short Slideshare below.

Read More

Blog Feature

Information Security  |  Privacy

Does the Privacy of Your Personal Information Worry You?

Does the privacy of your personal information worry you? Consider the following from Bruce Schneier’s Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World: “Surveillance is the business model of the Internet for two primary reasons: people like free, and people like convenient. The truth is, though, that people aren’t given much of a choice. It’s either surveillance or nothing, and the surveillance is conveniently invisible, so you don’t have to think about it.”

Read More

Blog Feature

Analytics  |  Enterprise Content Management (ECM)  |  Information Security  |  Process Automation

With Apologies to Julie Andrews, These Are a Few of My Favorite #AIIM15 Tweets

Here is a sampling from some of my favorite #AIIM15 tweets. Enjoy.

Read More