Blog Banner

Category Archives: Collaboration

HiSoftware Sheriff and Chris McNulty to Arrive in Austin for SPTechCon

Logo for SPTechCon TexasNext week, the Sheriff is in town at SPTechCon in Austin Texas. HiSoftware and Cryptzone (if you haven’t heard we’re merging) will offer advice on how to keep SharePoint content secure while maximizing your investment in the collaboration platform. Head on over to the HiSoftware/Cryptzone Booth (702) to learn more about our award-winning solutions for secure collaboration and what we have in store for Office 365 – check our blog for the announcement on Feb 9th.

Is Your Intellectual Property Going for a Walk?

Decorative image of man typingDo you know if your intellectual property is going for a walk? The chances are it is. One in five employees are going rogue with corporate data according to a Help Net Security article reporting findings from a Vanson Bourne survey. According to the article, these employees have “uploaded proprietary corporate data to a cloud application, such as Dropbox or Google Docs, with the specific intent of sharing it outside of the company.”

Worried? You should be. The article reported that 66% of users are able to access those cloud storage applications after leaving their last job – even though 60% of employees were aware that their employer strictly forbids taking intellectual property (IP) after leaving the company. One in four admitted they would take copies of corporate data with them when leaving a company.

Best Compliance and Security Resources of 2014

Decorative image of 2014It feels like we just started 2014, but somehow it is already December. With the year coming to a close, it is a great time to reflect back on lessons learned. Over the past year, we’ve blogged on topics ranging from data privacy, SharePoint security, Web accessibility, content compliance, HIPAA, ITAR and much more, to help any organization seeking to improve content compliance and security with suggestions on where to start, what to avoid and best practices.

As we wrap up another year, we thought we would share our top viewed blogs of 2014:

Keeping Data Safe This Black Friday

Decorative image of "E-Buy" Computer Key Tomorrow, most Americans will be enjoying Thanksgiving festivities with their family, celebrating what they are truly thankful for over a feast of plenty. However, the Friday after is a different story. While some might want to stay put and watch the shopping unfold on the news, others will be in the depths of shopping galore. And while I do like a little shopping myself, I’d like to take a minute to remind everyone about keeping data safe this black Friday.

High profile retail data breaches have also been of plenty over the last year. It was almost a year ago that Target was breached, and Sally Beauty, Neiman Marcus, Michaels, Kmart and Home Depot have all recently suffered data breaches that exposed their customers’ personal and payment card data. With billions to be spent on Black Friday, and a lot of that spent via credit and debit cards, retailers are responsible for a whopping amount of personally identifiable information (PII) and financial information.

What Every Business Can Learn from Snowden

Decorative image of 4News out that there is a second or even third leaker turning sensitive documents about the U.S. government’s terrorist watch list to a journalist reminds us all about the security of information. With this in mind, today we focus on what every business can learn from Snowden.

While you may not be keeping national secrets, content is the bread and butter for any organization. It might be customer information, HR details, intellectual property (IP) or financial and commercial information. For organizations to get the most out of content, we collaborate on it. We have it stored in platforms like SharePoint or in file shares. It is online, offline, in the cloud, on our desktops or mobile devices. We need it to achieve an end goal.

HiSoftware Accessibility Experts to Present at Accessing Higher Ground

Ahead logoNext week, HiSoftware’s Jeff Singleton and Ken Nakata will present at the 17th Annual Accessing Higher Ground: Accessible Media, Web and Technology Conference.

The event held from November 17, 2014 – November 21, 2014 in Colorado is focused on the implementation and benefits of Accessible Media, Universal Design and Assistive Technology in the university, business and public setting. Other topic areas cover legal and policy issues, including ADA and 508 compliance. The creation of accessible media and information resources, including Web pages and library resources are a particular focus of the event.

2015 Trends: Risk-Based Security and Self-Protection & Context-Rich Systems

decorative image of 2015It’s hard to believe we are in the last quarter of 2014. This has been a tough year for security with household names including Target, Sally Beauty, Neiman Marcus, Michaels, KMart, Dairy Queen and Home Depot all suffering data breaches that exposed their customers’ personal and payment card data. As we all look towards 2015 and our security practices in light of these breaches, Gartner’s recently released top 10 strategic technology trends struck a chord. Two I found particularly relevant to our readers include:

Trick or Treat? IT Security Pros Beware

IT security professionals, beware! Here are four individuals you’ll want to avoid this Halloween and steps you can take to protect your organization against them throughout the year!

Decorative image of vampire mouth and teethThe Vampire

Vampires feed on the blood of living creatures and cause mischief amongst the neighborhoods they live. This Halloween, avoid vampires in the workplace. These are the employees that maliciously suck information like client contacts, internal communications on products and confidential information from the organization. With 50% of employees admitting to taking corporate data with them when they leave a job, it’s important these vampires are stopped.

HiSoftware’s New Product and Accessibility Training Portal

Screenshot of  training video portalWant to learn more about using HiSoftware’s products? Now we have the tool for you. Today we announced the availability of a new on-demand, video-based Product and Accessibility Training Portal to improve customers’ working knowledge of products and provide in-depth Web accessibility training for developers.

Message In a Bottle – Identity and Access Management in the SharePoint World

Decorative image of ship in bottle

Source: http://en.wikicollecting.org/antique-ships-in-bottles

For a long time, identity and access management (IAM) has been something outside the world of most implementations. Who you are, and what you can do, have stayed almost entirely within the walled garden of SharePoint farms.

Over the past few years, however, SharePoint’s been spilling out of its bottle – into the cloud and into engagement with users and systems outside the realm of on-premises data centers, networks, and Active Directory. IAM is no longer something done for “other” enterprise systems, but important to consider as new usage comes into SharePoint, and as SharePoint apps and content are extended outside the traditional farm.

Powered by WordPress