Information Security

Making the Case for Workflow Success at Law Firms

By |Sep 26, 2016|

Understanding the kind of work legal entities perform is integral in helping them create document workflows that can not only save them time and money, but also protect them where it matters most.

Looking Back to Look Ahead

By |Dec 21, 2015|

All year long, we post blogs about a variety of topics that we hope will be of interest to you. As we look back on our 2015 blog series, productivity, security and mobility have emerged as the topics of many of our most-read posts.

How Growth Changes Expectations

By |Sep 10, 2015|

When your company is growing fast, you’re leaving the world of the small company, and are on your way to the world of the big company. The rules of the game are a strange mix of both worlds. The pace is fast and exciting, but so are the worries.

  • Data security
    Permalink Gallery

    Beware the Paper Trail! Why Your Biggest Security Threat Might Be Right at Your Own Printer

Beware the Paper Trail! Why Your Biggest Security Threat Might Be Right at Your Own Printer

By |Sep 9, 2015|

A whopping 90% of companies have had security breaches because of printing. Odds are you have, too. From salaries and performance reviews to contracts and competitive data, sensitive information is most often compromised by employees who think of security as a problem to be dealt with from the outside in, rather than the other way around.

Business or Pleasure? How Your Safety Risks Differ, and the Travel Security Checklist Every Employee Needs

By |Sep 2, 2015|

This simple security checklist shows you just how easy – and how vital – it is to protect your information while traveling. Just as you guard your wallet more closely in a crowded public space, so should you closely guard the sensitive information stored in your laptop and mobile devices.