Colligo Blog: Data Compliance

3 steps to turning IT into a customer-driven organization

Call it shadow IT or rogue IT, the increasing use of unsanctioned cloud apps by employees is a symptom, not an illness. It happens primarily because employees want something that their IT department isn’t providing. Plain and simple. In a recent article published on IT Business Net, author Sarah Lahav argues that IT needs to …

Continue reading »

Thinking about a mobile SharePoint solution? 5 must-haves for IT

Mobile SharePoint

With the deluge of mobile devices into the enterprise comes an IT nightmare of new dimensions. Expectations have changed. IT policies need to adapt to fit the new generation of workers, yet the requirements for security of corporate data remain. Meeting these conflicting needs is a delicate balancing act. The majority of large organizations have …

Continue reading »

What’s Going Wrong with BYOD?

What's wrong with BYOD

Around this time last year, Gartner predicted that by 2017, half of employers would require employees to supply their own device for work purposes. While a BYOD (Bring Your Own Device) strategy is still touted by some as “the” answer to appeasing a demanding mobile workforce and to reducing IT costs, the movement is showing …

Continue reading »

How to Enhance Collaboration & Mitigate Risk with Better Document Management in SharePoint?

Join Colligo and partner Gig Werks for a complimentary webcast on how Architecture, Engineering & Construction (AEC) organizations can Enhance Collaboration and Mitigate Risk with Email and Document Management in SharePoint. In organizations governed by rising costs, slim margins and the threat of litigation, keeping complex, multi-party projects on-time and on-budget requires up-to-the minute collaboration. An …

Continue reading »

Could Saving All Your Data Trigger A Knowledge Management Crisis?

could-saving-all | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-illustration-crisis-ahead-warning-sign/146924755

In the early days of “Big Data,” some organizations started keeping all of their data, thinking they might want it later. Now, they’re facing knowledge management issues. While most companies have effective ways of organizing, compressing and backing up their data, few truly put it to good use, according to a recent article on Forbes.com.

Continue reading »

Ready To Go All Electronic With Email Records Management? Let SharePoint Help!

Ready-to-go | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-hand-press-button-and-e-mail/174255197

While some federal agencies still print and file their emails to maintain records, looming deadlines are putting pressure on federal records managers to go all electronic, an article from InformationWeek reports. Learn how SharePoint is able to you cost-effectively make the transition to an online records management system.

Continue reading »

Are You Worrying Too Much About Mobile Security?

worry-mobile-security | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-man-and-woman-with-cell-phones/462509917

In a recent article in CITEworld, Nir Zuk, founder and CEO of Palo Alto Networks, talks about the widespread misconception that mobile applications are less secure than desktop applications. Find the right balancing act that allows for security and productivity is the key to businesses confidently taking advantage of smartphones and tablets.

Continue reading »

Could The Internet Of Things (IoT) Reshape Enterprise Software And Security?

internet-of-things | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-woman-connecting-network-cables-to-switches/465629331

Just as the advent of social media changed how our culture views privacy, the “internet of things” (IoT) is likely to change how organizations think about the security of their enterprise software and information. The rise of purpose-built devices that gather and generate information signals a dramatic change in IT security.

Continue reading »

Using Mobile Device Management (MDM) To Secure Data In BYOD Workplaces

mobile-device-management | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-illustration-byod-bring-your-own-device-security/477385045

Many mobile applications present security risks to business data stored on employees’ smartphones and tablets. Much of the risk stems from misconfigured and misused mobile apps, rather than sophisticated hacking attempts, according to an article from Computerworld UK. Mobile device management (MDM) helps ensure security for corporate data.

Continue reading »

Want To Stop Risky File-Sharing? Use Enterprise Collaboration Software

risky-file-sharing | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-web-threat/155263860

People need to share information inside and outside of the organization — that’s just how work gets done. If your IT department doesn’t provide enterprise collaboration software on par with consumer-grade file-sharing tools, employees resort to riskier file sharing. This “shadow IT” increases risks of a data breach, according to an article from Business News Daily.

Continue reading »