1 to 10 of 33
Sort by

Blog Entry
Information Security Checklist: Best Practices for SharePoint

So for true security of data, a layered approach to data security that bases security on the sensitivity of the information (content) itself, or one that is “content-aware”, is required versus just looking at access controls

Matthew Bretzius's profile image

Blog Entry
Silver Lining Security: Keeping Your Cloud Data Safe

It relieves organizations of the risks involved with storage and security of paper or microfilm documents, yet it is often forgotten that there are security steps which need to be taken after documents and data have been shifted to the Cloud

Dennis Kempner's profile image

Blog Entry
eMail Security in the Cloud – are you afraid (I am)?

The second insight showed that the principal obstacles to moving to the cloud remain the same: availability, security and data loss. In regards to security, 80% of organizations were not considering a move to Office 365 because of the security issue and vulnerability of eMail in the cloud

Cate Evans's profile image

Blog Entry
Ensuring Compliance: Information Types Your Organization Should Be Concerned About

This sensitive information can include: personal information: birthdate, address, social security number, race medical information: medical history, allergies, patient health records, insurance information financial information: employment records, tax information, bank accounts These types of company, customer, or employee sensitive security information, logistical information, financial information, or even an improper address or phone number, may create privacy and/or security threats that could be exploited by a third party. Mishandling sensitive information can create unintended consequences that could carry civil or criminal penalties and fines, monetary damages, and even potential national security risks

Matthew Bretzius's profile image

Blog Entry
China Further Expands Reach of Data Localization Law to Multinationals

” [1] The definition of a CIIO in the Law is ambiguous and described as public-facing entities that maintain “critical information infrastructure that if destroyed, losing function or leaking data might seriously endanger national security, national welfare and the people’s livelihood…” Examples of the sectors subject to this definition include businesses operating in public communications and information services, power, traffic, water, etc., which may very well implicate multinational corporations (Multinationals). On April 11, 2017, the Cyberspace Administration of China released the draft Measures for Security Assessment of Outbound Transmission of Personal Information and Important Data (Draft Measures)

Jennifer Chadband's profile image

Discussion Post
Reminder - Webinar AIIM True North Mar 25 - We're under attack! Is our data safe?

Reminder that AIIM True North is presenting a webinar on March 25, 2021 at 12:00 PM ET. The presentation will be a case study of a data breach and will explore the prospects and options of approaching a "breach-proof" state. This webinar is eligible for 1.0 CEU towards renewing your CIP...