article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

AIIM training has a long history, going back to 2001 when AIIM developed the Fundamentals of ECM System Implementation course. But we didn’t really formalize our educational programs until 2006 when we released the AIIM Enterprise Content Management (ECM) and Electronic Records Management (ERM) courses. Which Training is Right for Me?

ECM 116
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. Longtime network and system administrator Jack Daniel is a technology community activist, mentor, and storyteller.

article thumbnail

MY TAKE: Remote classes, mobile computing heighten need for a security culture in K-12 schools

The Last Watchdog

The prospect of remotely-taught lessons remaining widespread for some time to come has profound privacy and cybersecurity implications, going forward. And yet, school districts, now more so than ever, must take proactive steps to mitigate the same privacy and data security risks as any other small- to medium-sized business (SMB.)

Security 277