Blog Banner

Category Archives: Compliance

Data Privacy Lessons Learned from 2014

Decorative image, hand covering the word privacyWhen we look back in a few years, some might consider 2014 the year of the data breach. High profile breaches of brands like Michaels, Sally Beauty, Neiman Marcus, Dairy Queen and Home Depot are the names you think of instantly. It might surprise you to learn that there have been a reported 720 breaches, representing a 24.8 percent increase over the same time period last year according to Identify Theft Resource Center.

Best Compliance and Security Resources of 2014

Decorative image of 2014It feels like we just started 2014, but somehow it is already December. With the year coming to a close, it is a great time to reflect back on lessons learned. Over the past year, we’ve blogged on topics ranging from data privacy, SharePoint security, Web accessibility, content compliance, HIPAA, ITAR and much more, to help any organization seeking to improve content compliance and security with suggestions on where to start, what to avoid and best practices.

As we wrap up another year, we thought we would share our top viewed blogs of 2014:

Keeping Data Safe This Black Friday

Decorative image of "E-Buy" Computer Key Tomorrow, most Americans will be enjoying Thanksgiving festivities with their family, celebrating what they are truly thankful for over a feast of plenty. However, the Friday after is a different story. While some might want to stay put and watch the shopping unfold on the news, others will be in the depths of shopping galore. And while I do like a little shopping myself, I’d like to take a minute to remind everyone about keeping data safe this black Friday.

High profile retail data breaches have also been of plenty over the last year. It was almost a year ago that Target was breached, and Sally Beauty, Neiman Marcus, Michaels, Kmart and Home Depot have all recently suffered data breaches that exposed their customers’ personal and payment card data. With billions to be spent on Black Friday, and a lot of that spent via credit and debit cards, retailers are responsible for a whopping amount of personally identifiable information (PII) and financial information.

Trick or Treat? IT Security Pros Beware

IT security professionals, beware! Here are four individuals you’ll want to avoid this Halloween and steps you can take to protect your organization against them throughout the year!

Decorative image of vampire mouth and teethThe Vampire

Vampires feed on the blood of living creatures and cause mischief amongst the neighborhoods they live. This Halloween, avoid vampires in the workplace. These are the employees that maliciously suck information like client contacts, internal communications on products and confidential information from the organization. With 50% of employees admitting to taking corporate data with them when they leave a job, it’s important these vampires are stopped.

HiSoftware’s New Product and Accessibility Training Portal

Screenshot of  training video portalWant to learn more about using HiSoftware’s products? Now we have the tool for you. Today we announced the availability of a new on-demand, video-based Product and Accessibility Training Portal to improve customers’ working knowledge of products and provide in-depth Web accessibility training for developers.

Join HiSoftware at SharePoint Saturday New Hampshire #SPSNH

Logo of SharePoint Saturday EventsSharePoint Saturday New Hampshire#SPSNH is tomorrow and it’s in HiSoftware’s backyard. We’re excited to support our local SharePoint Saturday as a lunch sponsor and will offer you an overview of HiSofware as you eat. Our CTO and Microsoft MVP, Chris McNulty will also present a session on “Access Apps for Business Users with PowerBI on Office 365” (see details below).

Simplifying the Creation of Non-Employee Portals in SharePoint

decorative image of employees with question marksSharePoint 2013 offers companies more flexibility in creating portals for internal and external collaboration alike. Many companies are now looking to use the platform to build hubs for non-employees to access information. The problem is there are some issues and limitations with Microsoft’s recommended strategy for creating these portals that could waste resources and present security issues.

4 Types of Financial Services Data You Need to Worry About

Decorative image of dataThe creation, integration, consumption, and analysis of information in various forms drives the products, services, operations, and finances of the organization, determines strategy, and impacts operations for financial services organizations. A challenge to financial services organizations (as well as other industries) is to govern information and use it to reliably achieve objectives. This requires managing the uncertainty and exposure to risk that information use brings to the organization, while acting with full integrity to laws, values, social accountability, and internal policies regarding information.

TAFE SWSi Solves Accessibility Issues in SharePoint and on the Web with HiSoftware

logo of TAFE SWSiTAFE NSW is Australia’s public vocational education and training (VET) provider and has an essential role to play in strengthening the skills base of the New South Wales (NSW) economy and supporting economic growth for its communities. Each Institute offers a broad range of courses and specialist services to meet the needs of its customers, industry partners and local community.

Shedding Light on HIPAA Urban Myths

Decorative image of computer chip with healthcare symbolWe recently hosted a webinar on “HIPAA & Secure Information Governance: Myths, Realities & Practical Solutions with guest speaker and HIPAA expert Kenneth N. Rashbaum, Esq. at Barton LLP and our CTO, Chris McNulty. In case you missed it, here are the three HIPAA Urban Myths discussed:

Myth 1 – All disclosures of medical information are breaches. Patients and the Office of Civil Rights of HHS must be notified immediately.

Powered by WordPress