Protection and Privacy

Learn how to:

Protect information assets regardless of where they are
Guard against fraud and comply with regulations 
Reduce risk and cost by eliminating what you don’t need  
Attack your most obvious content problem -- email

61 - 70 Results out of 493

The envelope please - Top 10 Blog Posts for September

John Mancini

Here are the top 10 Digital Landfill blog posts for September (by views). Check them out!

What Underpins the ECM Name Game?

eBook

Download this eBook and let us help demystify the next generation of information management, and outline a community definition—sourced from the voices of 289 respondents of a recent AIIM survey—that speaks in practical business terms that are most relevant to end users.

Pudding. Yes, Pudding. A key concept to improving enterprise search.

John Mancini

My wife and I are big fans of the British Bake Off show – it’s called the Great British Baking Show in the US for Pillsbury copyright reasons.

Drowning in Emails? Top Tips to Manage Them Like a Pro

As organizations strive to digitalize the workplace, there is great value on getting the right information at the right time -- including with emails. Whether you want to manage emails right within the email client or at the server level with rules based email management, email management is a best practice more organizations need to implement. Join us to learn some best practices on how to achieve this.

Don’t Just Analyze Your Processes: Learn How to Quickly Implement Change for Progress

Businesses have come to realize the importance of analyzing their processes as the key to progression. But, do we have the right people analyzing our processes? Do we know even know HOW to analyze them? This ongoing effort needs to be made at the user level where the work is done and the process is best understood. There’s a major advantage and benefit of empowering your workforce to be the change-enablers, delivering the greatest benefit for the business. Join us as we outline some best practices for process improvement and how to quickly implement these changes.

I'm doing some research on content migration and integration

John Mancini

I'm doing some research on content integration and migration.

I'd welcome your opinion.

Dear CFO: It´s Time to Address Your Digital Gaps

Atle Skjekkeland

Everybody is now talking about the need for a digital transformation. Companies need to improve digital engagement and corporate productivity to better serve click-to-brick customers and millennials entering the workplace expecting online services and almost instant gratification.

Data Privacy – Solving Negligence, Bad Practices, Access Control, and Compliance Issues

There’s no denying that data leaks and breaches are a threat. According to recent AIIM research, a large majority of data loss or exposure is not due to hacking or malicious attacks but due to staff negligence, bad practices, or unauthorized access. So how can you share your sensitive data and information to the intended recipients outside your firewalls safely and securely – and in a compliant manner?  In this webinar, we’ll outline the top data privacy threats to your internal operations and how they can be solved. We’ll discuss best practices such as: monitoring who is reading and accessing your sensitive documents; understanding and incorporating any regulatory compliance requirements vital to your organization’s operation; and handling sensitive data well while maintaining focus on your core business. We’ll also identify some of the biggest mistakes companies make when making decisions about securing sensitive data – and show you how to correct them.

Evaluate How You Run Your Large Capture Operation

An essential part of managing you or your client's business information is capturing it at the entry point. But, successful capture implementation isn’t driven by products, tools, and technologies – it’s the information professionals who are responsible to manage, configure, and operate the capture systems that really drive success. But just how does your organization stack up against others? How successfully are you leading a capture deployment in your (or your client’s) organization? We asked the capture leaders in the AIIM community these questions and more. Join us where we’ll learn about how the top leaders in the AIIM community successfully lead, navigate, and evaluate a capture deployment. Whether you manage your operations in house or outsource this vital function, or if you are the provider of this outsourced endeavor, this webinar is for you.

Guest post - 3 Reasons why Content Integration ought to be a priority

Rikkert Engels

Most organizations finally believe that maximizing the value of content and information through a coherent information strategy is critical to their future in a digital world. Their information strategy requires a content integration platform, one that is flexible enough to evolve over time. Why? Here are the 3 main reasons
Back to Top Back to Top