Before signing your SLA, ask these 9 questions
This blog was originally written by Chris Plauschinn for RicoheDiscovery.com.
Employees are often considered the weakest link in the security chain. For this reaso...
Why you need to implement a data strategy now
By: Jessica Lockett
How can you address what you don’t know you have? No, this isn’t a trick question. The answer is simply that you cannot. To know and effectively addr...
How CFOs can reduce information security risk
Data security isn’t just something that your IT team needs to address.
Since a breach can impact every area of an organisation, keeping sensitive data secure is also a t...
Ricoh – The Transition Expert
Most local governments have relied on paper-based systems for their entire history, which may be up to hundreds of years. It can be difficult to change something that has...
Protect yourself against wearable tech hacks
The wellness movement has started to take the tech world by storm. Every day, more of us want to better understand our health and fitness - and whether that’s done by tra...
How to protect your data from ransomware
We’re working in a world where technology, workplaces, and behaviors are rapidly evolving. And while this has greatly improved many aspects of business, there are also ce...
Avoid Scandals by using ECM
As noted in a recent CP24 article, the city of Toronto recently uncovered a long-running bid-rigging scandal. Contractors were regularly colluding in order to split proje...
Cybersecurity: Don’t overlook your printer
Originally posted on Nuance What’s Next Feb. 22, 2017
It’s happened again. According to a recent article in ITPRO, a hacker was able to gain access to more than 15...