White House National Cyber Strategy: An Analysis

Data Breach Today

Security Experts Examine Administration's Document and Rhetoric A national cybersecurity strategy document released by the White House last week - along with comments from a top Trump administration official that the U.S.

My Latest Article Published at Document Strategy Magazine

Getting Information Done

I attended two recent presentations that offered some practical strategies to help information governance professionals align and present project initiatives in a way that will help get them funded.

The US National Cyber Strategy

Schneier on Security

Last month the White House released the " National Cyber Strategy of the United States of America. I generally don't have much to say about these sorts of documents. And the strategy includes no details.

My Latest Article Published at Document Strategy Magazine

Getting Information Done

Creating a Culture of Information Management Excellence Last year, I wrote an article titled, “ What Does Culture Have to Do with Information Management? ” which made the case for addressing culture as a part of any successful information management implementation project. Today, I wanted to offer some practical advice on how to create or install a culture of information management excellence. So, how do we actually create this type of culture? Borrowing from John C.

Mandatory documentation for ISO 22301

IT Governance

ISO 22301 certification requires organisations to prove their compliance with the standard with appropriate documentation. List of documents required for ISO 22301:2012 business continuity management system (BCMS). You must document: Context of the organisation (4.1).

Harness Your Enterprise Data Warehouse Strategy

Perficient Data & Analytics

A proper enterprise data strategy can empower a business. billion clinical documents. A data enterprise strategy is a well-rounded direction for an organization to potentially harness data-driven capabilities. A great enterprise data strategy is composed of 4 major factors. When the strategy is relevant, the information is contextual to the organization, therefore it’s not generic. This strategy should accelerate the business.

5 Ways PDF Solutions Transform Digital Strategy


What if every file—from documents to multimedia—was digital and used the same file format: “File.everything”— wouldn’t that be nice? But we need capable tools– here are 5 ways PDF solutions transform digital strategy with powerful benefits: Rapid Document Conversion.

5 Tips for Choosing a Document Scanning Vendor

Armstrong Archives

After all, document scanning is an intensive task, so finding the right partner is essential. When dealing with sensitive documents containing PII, it is essential that you (and your clients, employees, and vendors) are protected.

Cybersecurity guidance targets medical records strategies

Information Management Resources

Cyber security Documents and records retention Data governance Mobile technology AHIMAFocusing on technology ignores the potential of people, processes and policies, says Kathy Downing.

5 Major Reasons Document Storage Still Matters

Archive Document Data Storage

In an age where digital information rules, it’s easy to dismiss hard copy documents, even though they play a critical role in your business. Key documents help your organisation document compliance, ensure due diligence, and support ongoing business operations. In this blog, we review four major reasons to have a document storage strategy. For a low monthly fee, your documents and files are secure, organised and accessible. .

Strategies to Protect your Records from Ransomware

The Texas Record

Although there are many types of ransomware, the strategies you use to protect yourself are essentially the same. Here are some key strategies that you can employ in your office: 1.

5 Document Management Mistakes to Avoid

Archive Document Data Storage

Failing to manage your documents efficiently and securely can cost your organisation time, money, and legal problems. Is your document management plan up to par? Here are five common document management mistakes to avoid. This may sound like a no-brainer, but many organisations don’t know what documents to keep, how long to store them, and when they should be destroyed. A file shredding service helps you destroy old documents quickly and securely.

What’s in your data and analytics strategy?

Information Management Resources

We have written a number of research pieces on strategy; and we have analyzed many client produced documents. From them, here are thoughts on things organizations should be doing. Data management Analytics Predictive analytics

White House and Pentagon Announce New Cyber Strategies

Data Matters

The Trump Administration continued to put its stamp on federal cybersecurity policy last week, as the White House issued its National Cyber Strategy while the Pentagon announced the Department of Defense Cyber Strategy. White House National Cyber Strategy. These pillars would not seem out of place in either an Obama or Bush Administration document, and, indeed the Strategy is more about continuity of approach than dramatic change. Summary of DoD Cyber Strategy.

Records Storage: A Cost Effective Strategy for Managing What You Shred

Record Nations

Document management can be a hairy task. After planning, implementing, and trying to maintain all of your organizational strategies, you can be blinded to certain efficient strategies.

Video 60

The Scottish Cyber Resilience Strategy for health boards

IT Governance

The Cyber Resilience Strategy for the Scottish public sector was launched in November 2017 and aims to promote cyber resilience. All Scottish public sector bodies are required to comply with the Cyber Resilience Strategy; this includes health boards and the NHS.

Your Records Strategy Should Evolve with Your Business


You were probably handling a lot of paper, trying to empty your email inbox, and storing important files in a document management system. If you’re like most people, you may be working with network file shares, one or more document management systems, an ERP system, an HR system, a CRM system, email, and more! Think back ten or fifteen years. How many different collaboration systems was your organization using?

Nuance Document Imaging Solutions Now Available Through Staples Managed Print Services, Opening New Growth Channel

Document Imaging Report

September 11, 2018 – Nuance Communications (NASDAQ: NUAN) today announced it is offering Document Imaging solutions to customers of Staples Technology Solutions, a division of Staples, Inc., BURLINGTON, Mass.,

Sales 52

DocuWare: Rapid Expansion of Cloud Solutions for Document Management

Document Imaging Report

With Microsoft Azure as its cloud infrastructure, DocuWare empowers its customers with document management and workflow automation services built for future-readiness.

DocuWare’s “Cloud-First” Strategy Results in Record Growth


At DocuWare we’re dedicated to providing document management and workflow automation solutions that are affordable, flexible, easy to use and quick to implement – and so a cloud-first approach is the strategy we are focusing on. Cloud Enterprise Content Management Customer Experience

PCI DSS policies address the weakest link – people

IT Governance

Drafting detailed data protection policies and documentation is vital for improving security for your customers, stakeholders and brand because it shows your understanding and commitment to the PCI DSS (Payment Card Industry Data Security Standard).

Scan and Shred: A Critical Combination

Record Nations

To keep records management organized and secure, the best strategy is often a joint approach covering both scanning new records along with shredding the unnecessary hard-copies once you’re done. Document Scanning

Getting Started With Data Governance

Perficient Data & Analytics

Data governance doesn’t start in a vacuum; it requires plenty of advance thinking, preparation, and strategy. As such, successful data governance must begin with a foundation built on data principles and a well-thought-out data strategy.

What is direct connection outsourcing and what can it offer you?

OpenText Information Management

Direct connection sounds like a great way of exchanging EDI documents with your trading partners. Business Network EDI Release 16 Supply Chain B2B Best Practices & Strategy outsourcing security services

Hard Drive Health: Top 10 Maintenance Tips

Record Nations

In this video learn more about the value and top 10 tips for regular drive maintenance, the average hard drive lifespan, and strategies for what to do with failing or overheated drives. […]. Electronic Document Management

Tips 52

Document Management Grants are Now Available

Shoreline Records Management

One of the biggest challenges for Non-Profits, Social Services organizations, and Government Agencies looking for Document Management Solutions is the challenge of obtaining funding. Document Management Grants are now available, and our team can help you find the money you need to make your project a success. Document Management Records Management Business Strategy

5 Main Risks Businesses Face in the Digital Age

Armstrong Archives

Use this list of five common risks businesses often face today to start planning your prevention strategy. Ineffectual Business Strategies. While any business strategy is better than none, the most effective strategies stay flexible, scalable, and adaptable to change over time.

Risk 52

Vera to Power Canon Solutions America’s New Security Solutions and Services Strategy

Document Imaging Report

Through our new relationship with Vera, we can help our customers with protecting their information throughout their organization, including documents scanned on Canon imageRUNNER ADVANCE MFPs, and help secure workflows across a complex organization.” Based on the sensitivity of a document, where it’s been stored, and who has access, Vera has the capability to require additional authentication factors to confirm they are the right party to access sensitive data.

Empowering intelligent and connected business processes

OpenText Information Management

It includes emails, videos, documents, pictures, presentations, social media, and much more. Unstructured content is everywhere in an organization. It’s floating, filed, hidden, hoarded, siloed and stored in innumerable repositories across the enterprise.

Video 68

New Ebook Explains Why the Cloud Should Be Part of Your Digital Strategy


Are you debating whether to move your documents and digital workflow to the cloud, but not sure where to get practical input? Download the ebook Plan Your Move to Cloud Office Automation and get a step-by-step guide to separating fact from hype. The experiences your employees and customers have had with Apple or Amazon have reshaped their expectations of workplace technology. Cloud Team Productivity

eBook 21

Content Services EP3 updates

OpenText Information Management

OpenText Content Services EP3 continues to build on our product strategy to extend content into the lead applications where content is created and managed, while continuing to provide a digital backbone to meet regulatory and legal … The post Content Services EP3 updates appeared first on OpenText Blogs. Release 16 EP3 is the third Release 16 enhancement pack and will become generally available on October 31, 2017.

Policies and procedures you need for PCI DSS compliance

IT Governance

Policies might address: Information security : This details the organisation’s security strategy in relation to the storage, processing and transmission of credit card data. Maintain documentation. Technology can only do so much to protect an organisation from data breaches.

What is the 3-2-1 Rule for Data Backups?

Armstrong Archives

We are leaders in secure digital records management and document storage. We are well versed in the 3-2-1 rule and many other proven security strategies. Document Consulting Records Storage Records Storage Dallas

SEC Investment Company Reporting Modernization Support

Perficient Data & Analytics

Analysis: Identification of critical data gaps, implementation or reinforcement of data governance processes, and documentation of requirements. The first thing any investment company must do in response to the new SEC Investment Company Reporting Modernization is evaluate its current state of readiness. Chances are you have started a compliance program.

How Microsoft Word “Protected View” Stops Information Leaks

Perficient Data & Analytics

This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates. A web tracker is typically used when an author wants to know if a Word document is opened by a specific person or organization.

SEC Investment Company Reporting Modernization Foundational Work

Perficient Data & Analytics

Documentation of process, data, and technical requirements. In a new guide , we discuss the background of the SEC’s Investment Company Reporting Modernization Rules and the potential effects on individual financial institutions. The snippet below talks about the foundational work companies should have already completed.

The importance of metadata in enterprise search and aggregation

Information Management Resources

While there are several approaches to metadata strategies, it is the impact on, and value for, searching and aggregating large document sets that is an essential consideration for today’s enterprises. Data types Data visualization Data mining

FDIC Part 370 Testing Support

Perficient Data & Analytics

As with requirements definition, having testing support resources that are dedicated entirely to Part 370 will ensure consistency of methods, documentation, and reporting across all of the affected silos. Data & Analytics Financial Services Integration & IT Modernization Management Consulting Operations Regulatory Compliance Strategy 12 CFR Part 370 Banking Banks compliance FDIC FDIC Part 370 Finance Part 370 Regulatory

Requirements Gathering For FDIC Part 370

Perficient Data & Analytics

Working with stakeholders across business, technology, and operations to create business requirements documents and drive signoff. Managing versioning and storage to avoid a disorganized document lifecycle. Data & Analytics Financial Services Integration & IT Modernization Management Consulting Operations Regulatory Compliance Strategy 12 CFR Part 370 Banking Banks compliance FDIC FDIC Part 370 Finance Part 370 Regulatory

How To Qualify Cloud Vendors

Perficient Data & Analytics

They had just been allowing each business unit to select the applications that met its user requirements, accept whatever validation documentation the cloud vendor supplied (if any), and trust that the cloud vendor had been thorough and compliant. How is a change documented? We recently completed a 21 CFR Part 11 gap analysis engagement for a client that was largely using SaaS applications, but had no cloud vendor qualification process in place.

Cloud 40

Why Companies Are Excited About The Shared Investigator Platform

Perficient Data & Analytics

Beyond those administrative tasks, the SIP offers a consolidated and standardized user experience that employs standard messaging functionality, training tracking, and document sharing, regardless of the study or sponsor, with many more modules to come. This is the third post in a series on the TransCelerate Shared Investigator Platform (SIP). For more background on TransCelerate and SIP, see the previous two posts. In today’s post, we’ll be exploring the benefits of adopting the SIP.

Study 40

6 Best Practices for Your CECL Response Program

Perficient Data & Analytics

As with requirements definition, having testing support resources that are dedicated entirely to CECL will ensure consistency of methods, documentation, and reporting across all of the affected silos. Understanding the new current expected credit loss (CECL) regulation, how it impacts an organization, and how to go about implementing and managing a response program will be critical for firms carrying financial assets covered by the accounting standard update.

GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’

The Last Watchdog

The hacker/salesman also had other unclassified military intelligence for sale: an M1 Abrams tank maintenance manual, a tank platoon training course, a crew survival course, documentation on improvised explosive device (IED) mitigation tactics; he even claimed to have access to footage from a MQ-1 Predator drone. Department of Defense (DoD) generally handles unclassified documents such as these through the “Non-classified Internet Protocol Router Network,” or NIPRNet.