Blog

Konica Minolta Blog

Konica Minolta's blog provides valuable insights from executives and key contributors focusing on IT and cloud services, information management, and enterprise content solutions for your industry and practice. Our unique mix of innovation and expertise provides our readers with technology solutions to help their business run more efficiently. Check back often for updates on timely industry news commentary or subscribe to our RSS feed.  

  • Insights
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • I’m excited to be joined by Peter Wallqvist, Vice President of Strategy at iManage, for the second of a two-part blog series on legal document management solutions. Konica Minolta and All Covered — the IT Services Division of Konica Minolta — have a strategic partnership with iManage, which provides cutting-edge legal document management solutions. iManage recently acquired RAVN Systems, a UK-based company that developed an artificial intelligence (AI) platform that can organize, discover and summarize relevant information from large volumes of documents and unstructured data. (more…)

    Content Management, From Our Experts, From the Experts, Security, Solutions, Technology

    , , , , , , , , , , , , ,

    KMBS_LogoImagine a technology of bygone days that’s still a vital communications tool today, relied upon by businesses of all shapes, sizes, industries and regions worldwide, and still needed in today’s digital transformation. No, it’s not the automobile or the lightbulb. It’s fax communications. Consider this: The latest 2017 IDC Fax Trends survey confirms the vitality of fax and its continuing growth and relevancy today.  In the survey, 75 percent of total respondents expect fax usage to grow or remain the same in the next two years while in North America it’s expected to be an even higher 88 percent! (more…)

    Content Management, From Our Experts, Security, Solutions, Technology

    , , , , , , , , , , ,

    PrintFile sharing solutions are ubiquitous now. If you run a Google search for “online file sharing services,” you’ll get pages of possibilities returned like secure file sharing, secure file transferring, virtual data rooms, Google drives and every other imaginable solution out there. In today’s high-tech world, businesses of all verticals, but especially legal, deal with sensitive data understand the importance of sharing files securely.  With the likes of Konica Minolta and Workshare file sharing solutions, we’ve come a long way in how we now protect our client and customer data. (more…)

    Content Management, From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , , , , , ,

    Why Cyber Security Should Be Your Top Priority

    , Director of Integrated Marketing, All Covered

    eBookAs more and more core parts of our clients’ business have moved online or into the cloud, they have become increasingly concerned with cyber security. Malware, vulnerabilities and hacking have become part of their most pressing concerns, not something they’re content to simply leave to the IT guys.

    This rapidly evolving  security threat environment calls for a more comprehensive information security approach that goes beyond systems management to active protection. Thus, we’ve evolved our managed IT services and tweaked the name to go with the change: we’re now All Covered Care – Secure and Protect. (more…)

    Cloud, Content Management, From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , ,

    Pursue Justice & Eliminate Challenges with Legal Technology

    , Director of Channel & Client Advocacy, nQueue

    nQueue_Logo_450x311px_72dpi-300x207The world is changing. It’s a fact. Think about it, in your lifetime, you may have seen computers shrink smaller yet more powerful, phones move from rotary dial and party lines to devices that comfortably fit in your hand and hold more computing power than the computers that sent men to the moon.

    What if you and your law firm haven’t kept up with the times and haven’t yet embraced the right legal technology to improve your firm’s productivity? You can bet your client has and they expect you to be not only savvy with today’s technology, but to be innovative. (more…)

    Content Management, From the Experts, Security, Solutions, Technology

    , , , , , ,

    Blog-bizhubSecureYou may have heard about recent reports of network hackers gaining access to multifunction printers, causing headaches for IT and cyber security personnel. These stories in the news are creating a lot of noise in the industry, overstating the risks of having a printer or MFP installed within an organization’s network. Although the vulnerabilities could be a cause for concern, multifunction printer hacks are relatively harmless, causing incidents such as an MFP to “lock up” using denial of service and brute force attacks. This type of action would require an exceptional, concerted effort by a person within the firewall of an organization to attack a specific multifunction printer. Typically, a person who wanted to do cyber harm within a corporation wouldn’t spend this type of effort to attack a printing device.

    It is important to understand that these perceived network vulnerabilities can only be taken advantage of from within a company’s network environment. This means that the network hacker would need to be a company or organizational employee with private network access. The devices are not vulnerable from outside the firewall or from the Internet – unless the network is vulnerable to external attacks. If that is the case, the multifunction printer should be the least of an organization’s worries. Obviously, the first course of action must always be to secure the network.

    (more…)

    From Our Experts, Security

    , , , , , ,

    IP Theft and the Insider Threat

    , Managing Director, Computer Forensics

    PrecisionDiscovery_remarketingad_250x250_0831Your company has undoubtedly invested significant time, energy and money to develop intellectual property (IP) – unique ideas, methodologies and trade secrets – as well as other intangible assets – customer lists, plans for future products, non-public financial information, contracts with suppliers, software source code, and so on.

    These information assets are extremely valuable, and often what differentiate you from the competition. In the wrong hands – the hands of a competitor, for example – the damage could be catastrophic.

    IT professionals lie awake at night making sure their networks are protected from outside threats. And yet you don’t have to look too far to find high-profile examples of security breaches. The 2014 hacking of Sony Pictures and the release of thousands of private emails and documents was both costly and embarrassing for the company.

    Perhaps, it’s another headline-grabbing event that offers an indication of what may be a more common and pervasive threat to your information assets: the release of classified National Security Agency (NSA) documents by Edward Snowden. Snowden, you may recall, was a contractor working for the NSA when he copied and released classified information without authorization. This wasn’t a hack from the outside; it was the job of an “insider.” (more…)

    From the Experts, Security, Solutions

    , , , , , , , ,

    Health_imageOur country’s ever-evolving healthcare landscape makes the future very unpredictable.  Changes are occurring everywhere – regulation and legislation, reimbursement, technology, medical advances, and even the way healthcare is accessed and consumed. These changes impact how healthcare is delivered, paid for and administered. As such, it is imperative that Konica Minolta take an active role in understanding the industry and provide healthcare solutions in order to help our customers prepare for a future that will look very different than it does today.  (more…)

    Content Management, From Our Experts, Marketing, Security, Solutions, Strategy, Technology

    , , , , , , , , , ,

    Print

    “Change is the only constant in life,” so said Heraclitus, the Greek philosopher, around 500 B.C. As I look toward the legal environment in 2017, that saying is alive and well thanks to the emergence of robotics, other workplace of the future solutions and artificial intelligence (AI), the next critical wave of change in law firms.

    What is different from Heraclitus’ time is the velocity at which change is occurring. Advancing law firm technology has pushed firms to move uncommonly fast to implement the changes necessary to garner the benefits that are possible for strategic growth and overall survival. The law firm of the future must address these coming influences that are re-engineering how work will be done.  What are these influences that I believe will impact the legal arena in 2017? Here are my predictions: (more…)

    Cloud, Content Management, From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , , , , ,

    acutecareprovidersIn 2013, a covered entity reported to the U.S. Department of Health and Human Services Office for Civil Rights  that one of its workstations was infected with a malware program. This resulted in the impermissible disclosure of 1,670 individuals’ electronic protected health information. The ePHI included names, addresses, Social Security numbers, dates of birth, health insurance information, diagnoses and procedure codes.

    The covered entity, a hospital in the Northeast, determined that the malware was a generic remote access Trojan that infiltrated their system, providing impermissible access to ePHI, because the organization did not have a firewall in place.

    This is a common, basic lapse in compliance of covered entities. So, let’s examine the HIPAA settlement related to this organization. to better understand how you can improve your HIPAA compliance program. (more…)

    From the Experts, Security, Solutions

    , , , , , ,