Blog Banner

Category Archives: Collaboration

Most Common Governance Mistakes In SharePoint (and how to avoid them)

Decorative logo of Metalogix Best of Breed ShowcaseYesterday I joined Ruven Gotz, SharePoint MVP, Avanade alongside Jill Hannemann, Practice Director for Advisory Services, Portal Solutions and Gail Shlansky, Director of Product Marketing at Metalogix in a best of breed webinar “Most Common Governance Mistakes In SharePoint (and how to avoid them).”

The discussion focused on the mission critical role SharePoint plays in an organizations content management and collaboration efforts and as a result, the important role governance plays in securing information integrity. We also touched on optimizing the value of content stored, accessed and shared within SharePoint. Despite the fact that governance is considered critical, most organizations suffer from a governance gap.

During the webinar, host Ruven Gotz asked panelists a series of questions. Some are summarized below.

Privacy Breaches Must Stop!

Decorative image privacyIf you think content security is a nice to have; think again. Just last week, it was reported that Stanford Hospital & Clinics and two of its vendors are set to pay more than $4.1 million to settle a class action claim. The claim said they violated a state privacy law by allowing the medical information of approximately 20,000 emergency room patients to be posted online for nearly a year.

According to a statement released by Stanford:

  • Multi-Specialty Collection Services and Corcino & Associates will pay $3.3 million
  • Stanford Hospital & Clinics will pay $500,000 for a program to educate vendors on recent regulations that hold them accountable for privacy breaches
  • The hospital will also pay $250,000 to cover the administrative costs of the settlement

Stanford’s breach of protected healthcare information (PHI) was unknowingly and illegally displayed on a public website for nearly a year, beginning on Sept. 9, 2010 before it was discovered. With such steep financial settlements and/or government penalties possible, not knowing that someone in your organization accidentally published PHI or other personally identifiable information (PII) is not a defense. This isn’t an isolated case, a Forrester report shows that a surprising 75% of breaches come from within the company, not outside threats like hackers.  Data from CyberFactors shows a similar picture, where 50% of the reported incidents were caused by an external actor, 40% by someone inside the organization, and 6% by a third-party contractor or vendor. 

Live from CSUN 2014

It’s Friday morning at CSUN 2014.  This year has been a whirlwind of exciting opportunities, catching up with clients and industry colleagues, and contributing to the discussion about different technologies.  Here are some of the things that have kept us busy.

  • IAAP Launch.  Yesterday morning, we were at the official launch of the International Association of Accessibility Professionals (IAAP).  HiSoftware is a founding member of IAAP.  What’s not as well-known is that HiSoftware was called in at the last minute to orchestrate the accessibility testing of the content management software that IAAP will be using.  The event was a complete sell-out and had a huge attendance.   I think people in this space want and need a way to “professionalize” the accessibility profession (e.g. through certification exams) and to collaborate on a global scale.  If you are tasked with accessibility, I urge you to get involved!

#SPC14 Roundup

SPC14 HiSoftware boothLast week I was at the SharePoint Conference in Las Vegas to talk everything SharePoint compliance and security. After a few days reflection, here’s my roundup of the week:

 1.        Everything Compliance

Microsoft did a lot of taking about SharePoint, Office 365, and Yammer. It became clear that attendees were bee lining it for us to discuss how to make this all compliant. The challenge for these organizations is that they store highly confidential documents that contain personal health information (PHI) and personally identifiable information (PII). Some need to comply with PCI rules. So how do you make all of this compliant? As Microsoft continues to encourage all types of collaboration across its portfolio of products, technology that can audit, classify, restrict, encrypt, track and control content will become essential.

Join HiSoftware at the SharePoint Conference

The SharePoint Conference is right around the corner and we hope to see you during the show. While in Las Vegas, head over to the HiSoftware Booth (732) to learn more about our award winning solutions for secure collaboration and have some fun Sheriff style.

Decorative image of Most Wanted logoVote for SharePoint’s Most Wanted Villain!

You submitted your nominations for the most notorious characters in SharePoint. Now it’s time to pick the community favorite for the Most Wanted SharePoint Villain. Vote online or cast you ballot at Booth 732 during SPC!

Security Concerns on Non-Employee Access in SharePoint

Decorative image of a padlockDell recently released findings in a report “SharePoint and Security: A Survey of SharePoint Stakeholders” which had the goal of evaluating current approaches, experiences and opinions of SharePoint security. 202 individuals participated in the survey and all had responsibility for administration, technical oversight, or business ownership of Microsoft SharePoint.

Bonus: 2 More Do’s and Don’ts of Enterprise Collaboration

Decorative image of 22 Do's and Don'tsIf you are storing, accessing and exchanging content through SharePoint or file shares, you need to consider how best to balance collaboration with information security. Our latest whitepaper, 22 Do’s and Don’ts of Enterprise Collaboration offers a collection of 22 tips to ensure your organization practices secure collaboration to maximize productivity and minimize risk.

We previously offered you a teaser of three tips. Here’s a look at two more of the 22 do’s and don’ts covered:

Is Your Mobile Security Solution Protecting IP?

mobile devicesEarlier this month I outlined my predictions for 2014. This included how mobile security will become front of mind. I said:

Companies have been slow to put mobile security on their list of must haves. The mobile workforce is here to stay. I predict that mobile usage in the enterprise will continue to grow, which in turn will force companies to assess mobile access and look to put technological controls in place to mitigate mobile risk. The key is not to ban mobile devices, but rather to control the data that can be accessed from them.

Survey results reported by Bank Systems & Technology showed that the majority of IT and IT specialists say that their companies support BYOD, but they have also indicated that the companies do not use tools or policies to protect corporate data. Furthermore, “46%, out of the 60% who indicated that their companies support BYOD, say that their companies do not use tools or policies to protect corporate data.”

5 Days Left to Enter the SharePoint Most Wanted Contest

Decorative image of four Most Wanted postersSharePoint creates a Wild West of unstructured content that leads to users that have a hard time remembering the rules around data governance despite training and helpful reminders. At SPC 2012, we revealed our SharePoint “Most Wanted” characters: Slippery Fingers Sally, Foul Mouthed Mike the Social Media Monster and Cher the Clueless Uploader.

Now we want to hear from you!

You have 5 days left to tell us about the “Most Wanted” character within your organization for a chance to win an iPad. The winning entry will make our SharePoint Most Wanted list and be featured on a Most Wanted poster at the SharePoint Conference 2014. Over the past two weeks we’ve met some new characters including Harry the Hurricane, Dewey Doubledip, and Bill the Befuddled to name a few. We can’t wait to meet yours! Don’t forget two runners up will each receive a $50 Amazon gift certificate.

How Do You Enter?

It’s easy to enter the HiSoftware SharePoint Most Wanted Contest. First create a character name. Remember, this is all in good fun so please no real names. Then be sure to tell us what your character has done to earn his or her place as one of SharePoint’s “Most Wanted.” The deadline is this Friday, January 24th so be sure to get your entry in now for your chance to win.

Submit an Entry Now.

22 Do’s and Don’ts of Enterprise Collaboration

Decorative image of check and x markCollaboration between employees is a critical part of business success and a key driver for increasing competitiveness and productivity. If you are using enterprise collaborative environments from Microsoft SharePoint to file shares, or even social platforms, it is important to acknowledge the potential for a data breach. You do not want to find yourself in a position where you are scrambling to retrofit security measures after a breach.

What does a breach look like? Breaches can take many forms, from innocent “whoops” moments such as an employee accidently emailing a document containing confidential information to an unintended third party or mistakenly posting a file with employee social security numbers to a public facing website. Breaches also have a darker side, from a staff member looking to misuse customer or patient information for their own gain, to a disgruntled employee walking away with your intellectual property (IP).

If you are storing, accessing and exchanging content through SharePoint or file shares, you need to consider how best to balance collaboration with information security. Our latest whitepaper, 22 Do’s and Don’ts of Enterprise Collaboration offers a collection of 22 tips to ensure your organization practices secure collaboration to maximize productivity and minimize risk.

Powered by WordPress