Reminder that AIIM True North is presenting a webinar on March 25, 2021 at 12:00 PM ET. The presentation will be a case study of a data breach and will explore the prospects and options of approaching a "breach-proof" state. This webinar is eligible for 1.0 CEU towards renewing your CIP...
AIIM True North would like to invite you to a webinar on March 25, 2021 at 12:00 PM ET. The presentation will be a case study of data breach and will explore the prospects and options of approaching a "breach-proof" state. This webinar is eligible for 1.0 CEU towards renewing your CIP...
03-25-2021 | 12:00 - 13:00 ET
Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...
Why Prepare? The average total organizational cost of a data breach in the United States in 2015 was $6.8 million. [1] In 2016 alone, over 3,000 publicly disclosed data breaches have occurred so far, representing more than 2.2 billion compromised records. [2] In addition to the upfront...
For companies that operate in international jurisdictions, it is vital to stay up-to-date on legislative actions that affect data retention policies and compliance. This allows companies to make internal adjustments as necessary and to avoid costly sanctions and other harmful penalties for non...
Hey You ... With the Cloud in Your Eyes A little over a month from now the partisan faithful will gather under a sprawling Microsoft tent in Chicago and high-five to the pulsing thump of post enterprise Microsoft -- a mighty convergence of comforting office apps served over slick interfaces...
2 Comments - no search term matches found in comments.
On February 10, 2015 Box announced the beta for Enterprise Key Management. Here's my take on it and what it could mean for organizations ... https://christianpwalker.wordpress.com/2015/02/10/box-ekm/ #Security #EIM #box #cloud
You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting stuff in the cloud is...
Over the last few years, mass adoption of mobile devices at workplace has become one of the most dominant trends in Australian businesses. Considering the turbulent adoption rates in both personal and business settings, it is unsurprising that organizations saw both internal and external...