security

It’s in the Cloud. “What, Me Worry?” by , for

Blog Entry

This blog was co-authored by Norman Weiner, SVP Technology Services, Kaizen InfoSource. The “Cloud” and “Virtualization” have been driving forces behind the paradigm... read more

Big Data Meets the Search Media by , for

Blog Entry

Big data is one of those instantly graspable buzz terms. The only new ground it breaks is putting a faceless name to purposeful data capture. After all, it's not smog if the data engineers a... read more

BYOD - Run What Ya Brung by , for

Blog Entry

  In the interests of full disclosure; I use a corporately issued laptop, a self-provisioned smartphone (employer pays service), a self-provisioned tablet, and a personal laptop. My tab... read more

How we can make EHR even more secure by , for

Blog Entry

Browsing through news online recently, I came across a troubling story. Last month, Emory Healthcare in Atlanta announced that 10 discs containing electronic records on 315,000 pat... read more

Do you trust your Facebook users? Why/why not? by , for

Discussion

Lots of organizations still block Facebook and tools like it at the firewall - or at least they think they do (hello, iPad2!). Why is that? What's the difference between networking on Facebo... read more

Can Touchless Processing at the Point of Origination™ End the Paperless Office Debate? by , for

Blog Entry

Like the proverbial dead horse, the “paperless office” is a term that still elicits endless beatings.  What a sad state paper is in. We love it.  We hate it. Some days we e... read more

I cannot find my information by , for

Blog Entry

I like to watch what is going on in relation to information management – who doesn’t right? In particular, since the healthcare industry is on the move to go digital with patient rec... read more

Capture: The ideal application for Cloud by , for

Blog Entry

Capture:  The ideal application for Cloud   As I was brainstorming on a topic to write for this blog, I was inspired by Bob Larrivee's latest AIIM community blog entitled &... read more

Teach Your Children by , for

Blog Entry

Dateline Rochester – “A new survey says more than half of workers don't always follow or are unaware of their company’s security policies.” Sounds kind of like my... read more

The Ends, the Means, and Security Risk Mitigation by , for

Blog Entry

A little over a year ago, I posted on the Top 10 Cyber Threat Trends of the day, one of which was “attacks via USB drives.” Well, new survey regarding SharePoint security has just ec... read more