Blog Banner

Tag Archives: SharePoint

SPTechCon: SharePoint Compliance & Security, Chris McNulty Book Signing & More

Logo of SPTechConSharePoint security continues to be an ever present concern for organizations. Consider some recent stats on content security:

  • 46%, out of the 60% who indicated that their companies support BYOD, say that their companies do not use tools or policies to protect corporate data. Survey results reported by Bank Systems & Technology
  • Only 15% of respondents said their information governance plan is “in place, it’s important and it’s communicated and enforced.” AIIM survey of 548 members of its community

Next week, join HiSoftware at SPTechCon: The SharePoint Technology Conference in San Francisco to discuss these issues and how to keep SharePoint secure while maximizing your investment in the collaboration platform. Head on over to the HiSoftware Booth (605) to learn more about our award-winning solutions for secure collaboration and have some fun Sheriff style!

#SPC14 Roundup

SPC14 HiSoftware boothLast week I was at the SharePoint Conference in Las Vegas to talk everything SharePoint compliance and security. After a few days reflection, here’s my roundup of the week:

 1.        Everything Compliance

Microsoft did a lot of taking about SharePoint, Office 365, and Yammer. It became clear that attendees were bee lining it for us to discuss how to make this all compliant. The challenge for these organizations is that they store highly confidential documents that contain personal health information (PHI) and personally identifiable information (PII). Some need to comply with PCI rules. So how do you make all of this compliant? As Microsoft continues to encourage all types of collaboration across its portfolio of products, technology that can audit, classify, restrict, encrypt, track and control content will become essential.

Join HiSoftware at the SharePoint Conference

The SharePoint Conference is right around the corner and we hope to see you during the show. While in Las Vegas, head over to the HiSoftware Booth (732) to learn more about our award winning solutions for secure collaboration and have some fun Sheriff style.

Decorative image of Most Wanted logoVote for SharePoint’s Most Wanted Villain!

You submitted your nominations for the most notorious characters in SharePoint. Now it’s time to pick the community favorite for the Most Wanted SharePoint Villain. Vote online or cast you ballot at Booth 732 during SPC!

5 Days Left to Enter the SharePoint Most Wanted Contest

Decorative image of four Most Wanted postersSharePoint creates a Wild West of unstructured content that leads to users that have a hard time remembering the rules around data governance despite training and helpful reminders. At SPC 2012, we revealed our SharePoint “Most Wanted” characters: Slippery Fingers Sally, Foul Mouthed Mike the Social Media Monster and Cher the Clueless Uploader.

Now we want to hear from you!

You have 5 days left to tell us about the “Most Wanted” character within your organization for a chance to win an iPad. The winning entry will make our SharePoint Most Wanted list and be featured on a Most Wanted poster at the SharePoint Conference 2014. Over the past two weeks we’ve met some new characters including Harry the Hurricane, Dewey Doubledip, and Bill the Befuddled to name a few. We can’t wait to meet yours! Don’t forget two runners up will each receive a $50 Amazon gift certificate.

How Do You Enter?

It’s easy to enter the HiSoftware SharePoint Most Wanted Contest. First create a character name. Remember, this is all in good fun so please no real names. Then be sure to tell us what your character has done to earn his or her place as one of SharePoint’s “Most Wanted.” The deadline is this Friday, January 24th so be sure to get your entry in now for your chance to win.

Submit an Entry Now.

HiSoftware Top 5 Content Compliance and Security Resources for 2013

Decorative image of 5It’s been a busy 2013 at HiSoftware. Over the past year, we have blogged around a number of topics to offer advice on how to help you solve your compliance and security problems. Our blogs can help any organizations from risk managers to web developers as they seek to improve content compliance and security. For those of you using SharePoint, there are a number of topics to help you leverage the full benefits of collaboration while keeping sensitive content secure.

As we look back on 2013, here you’ll see our top performing blogs for the year that can help you as you develop your compliance and security strategy for 2014.

The Who, What, When, Where and How of Secure Collaboration

Decorative image of WWWHWOrganizations handle vast amounts of highly sensitive data from personally identifiable information (PII), protected healthcare information (PHI), and payment card information, to confidential company material including financials, M&A, intellectual property (IP) to name just a few. In many cases customer and employee information is heavily regulated by the Privacy Acts, HIPAA, HITECH, FINRA, PCI DSS and other federal and state regulations.

However, as the growing list of data breaches shows it continues to be a problem for organizations to secure. The challenge is that organizations and their employees are constantly adding and accessing a vast amount of electronic information to get the job done.

Collaboration is a must. The question that remains is how can you tell if your organization is collaborating securely and within regulatory guidelines?

Protect Your Content and Your People

Decorative image of a padlockThis week the International Association of Privacy Professionals (IAPP) is holding its Practical Privacy Series.  Yesterday we posted our Observations on NIST Appendix J from the show, and today’s post continues with the privacy theme.

A recent article from IAPP’s Privacy Perspective discussed the issue of data breaches caused by the mishandling of information by employees. In the article, the author, Kirk J. Nahra, CIPP/US, a partner with Wiley Rein LLP in Washington, D.C, suggested that while employees need access to sensitive information to do their job, organizations need a plan to make sure their own people are not the cause of a privacy and security breach.

Don’t Overlook the Importance of an Information Governance Strategy

PadlockMany organizations do not have a plan in place for information governance. In fact, only 15 percent of respondents in an AIIM survey of 548 members of its community said their information governance plan is “in place, it’s important and it’s communicated and enforced.”

Sam McCollum, an information governance consultant and CEO of SIMC Coaching, said in the KMWorld article ‘The key to information governance success: Start small’ that information governance is:

“…an accountability framework that includes the people, processes, policy and technology that ensure the effective management of information to enable an organization to achieve its strategic goals and business programs… It is a high-level, strategic function that provides direction to all information operations functions…[and] it has to take into consideration four areas: organization and culture (structure and change management), policy and measurements (the legal aspect), the effect on business processes, and technology optimization (the technology solutions).

HIPAA Omnibus Rule Deadline Passes: Are You in Compliance?

Healthcare networkThe grace period for the HIPAA Omnibus Rule has ended. As of last week, the updated rules expand the legal responsibilities to business associates of HIPAA covered entities. Now third-party organizations handling protected health information (PHI) must comply with security and privacy measures. If PHI is breached, these business associates will face the same legal requirements as healthcare providers, including notifying any affected patients.

Who is a HIPAA Business Associate? A HIPAA business associate includes a wide range of vendors who contract with covered entities and access PHI. Examples include technology vendors, services organizations, accountable care organizations (ACOs), and third party administrators. The official definition is available on the HHS website.

Why the Change? The basic principle of the Privacy Rule is to define and limit the circumstances in which an individual’s protected heath information may be used or disclosed by covered entities. There are many specifics to the Privacy Rule which can found in the HHS Summary of the HIPAA Privacy Rule.

This change means many vendors have had to transform and adapt both their agreements and compliance practices to meet the Privacy Rule. If you haven’t considered how these changes affect your business, you need to immediately.  

HiSoftware to Present at SharePoint Saturday New Hampshire

SharePoint Saturday Events LogoSharePoint Saturday New Hampshire is coming up this weekend at the Radisson Hotel, just around the corner from our corporate headquarters. If you’re attending, be sure to stop by the HiSoftware table to learn more about our solutions to rein in compliance and secure sensitive content in SharePoint for improved collaboration. We also invite you to join us during lunch for our session:

Tackling Compliance & Security in SharePoint: Solutions and strategies to secure content and improve

When: September 21, 2013

Where: Chesterfield Room from 12:30 pm – 1:15 pm

For more information go to:

In addition to laying out the most common challenges to secure collaboration, we will showcase our award-winning solutions for content-aware compliance and security in SharePoint. Stop by our table any time during the day to ask us how we are helping organizations like New Hampshire based Windham Professionals manage their security and compliance issues.

Powered by WordPress