Colligo Blog: Data Compliance

Heartbleed Hype: Are Mobile Applications A Security Risk?

heartbleed-hype | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-illustration-heartbleed-bug-heart-shape-with-red/485610973

The Heartbleed security breach has prompted plenty of hand-wringing about data security. A recent article in Information Week, for example, uses it as a jumping-off point to warn of the dangers of a less-than-secure BYOD mobile environment. These kinds of events happen, but they don’t mean companies are lax about data security or mobile devices.

Continue reading »

Do You Have Visibility Into The Applications Your Employees Are Using?

visibility-into-application | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-composite-image-of-businessman-standing-on/485226707

Security is at the core of any strong IT strategy. But with the rise of cloud computing, mobility, social and bring-your-own-device (BYOD), it’s a struggle for IT decision-makers to stay in control, according to an article from ITProPortal.com. What’s the key to regaining control over data? Provide an app-based mobile solution that people want to use.

Continue reading »

Records Managers: How To Confidently Embrace Mobile And Cloud Technologies

embrace-mobile-cloud-technology | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-virtual-cloud-computing-technology/457223685

An article from Fierce Content Management reports that many records managers are concerned about the cloud and mobile technologies. They now must deal with employees wanting to bring their own devices into the enterprise environment. The key is to embrace an app-centric solution that engages end users while preserving security.

Continue reading »

How Are Internal IT Security Teams Transforming Into Business Enablers?

transform-business-enablers | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-protected-access/478075405

While internal IT security teams still need to say “no” to risky behaviors, they’re increasingly saying “yes” to technologies that drive business opportunities, according to an article on BaselineMag.com. That’s because IT is being asked to become a business enabler and not an obstacle. The key is for both the business and IT to work closely together.

Continue reading »

3 Tips For Developing A Strong SharePoint Information Governance Strategy

info-governance-strategy | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-young-company/183123902

Are you struggling to use SharePoint effectively as a document management platform? If so, you’re not alone. Many organizations have this problem, and it’s largely due to SharePoint’s ease of use. The key is to develop a strong information governance strategy. An article on CMSWire outlines three tips for how to get started.

Continue reading »

Is It Time For A New Approach To Records Management?

new-approach-records-management | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-exhausted-mature-businessman-at-work/186196005

These days, organizations have a lot more than just paper documents to keep track of, and the volume of information keeps growing. As a result, traditional records management no longer works, Nick Inglis explains in an interview with SearchContentManagement.com. He argues that records management needs to evolve into retention management.

Continue reading »

3 Records Management Functions That Third-Party Solutions Improve In SharePoint 2013

records-management-functions | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-patient-medical-records/122578025

SharePoint 2013’s records management is certainly an improvement over earlier versions. It’s better at accommodating records management in a complex business environment of access rights, global enterprise search and multiple mobile targets, according to SearchContentManagement.com. Even so, three important capabilities are best attained using third-party solutions.

Continue reading »

How To Make Adding Metadata Simple And Stress-Free For Users

make-metadata-simple | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-businessman-at-computer/56518316

An article from SearchContentManagement.com reports that “enterprises often collect content without a justification and have poor retention strategies, opening themselves up to legal exposure.” Any plans for handling unstructured data must include adding metadata. Automatic metadata extraction is one way to make that process easy for users.

Continue reading »

Are Workers Taking Enterprise Data Security More Seriously?

enterprise-data-security | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-cloud-computing-security-concept/462067855

New research on mobile enterprise security highlighted in an article from Enterprise Apps Tech reveals that 25 percent of U.S. workers believe “data security is not their responsibility.” But the survey results aren’t all bad, with 93 percent of respondents indicating that “their workplace was at least modestly secure.”

Continue reading »

How Do Records Management Systems Help Public-Sector Organizations?

records-management-solutions | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-united-nations-new-york-city-usa/71264406

Records management systems might not be as attention-grabbing as devoting funds to a new park or improved roadways, but electronic content management (ECM) does offer big benefits in the public sector. An article from AIIM highlights some of the many ways such systems are able to help public-sector organizations, and by extension, the public.

Continue reading »