• Insights
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • IP Theft and the Insider Threat

    , Managing Director, Computer Forensics

    PrecisionDiscovery_remarketingad_250x250_0831Your company has undoubtedly invested significant time, energy and money to develop intellectual property (IP) – unique ideas, methodologies and trade secrets – as well as other intangible assets – customer lists, plans for future products, non-public financial information, contracts with suppliers, software source code, and so on.

    These information assets are extremely valuable, and often what differentiate you from the competition. In the wrong hands – the hands of a competitor, for example – the damage could be catastrophic.

    IT professionals lie awake at night making sure their networks are protected from outside threats. And yet you don’t have to look too far to find high-profile examples of security breaches. The 2014 hacking of Sony Pictures and the release of thousands of private emails and documents was both costly and embarrassing for the company.

    Perhaps, it’s another headline-grabbing event that offers an indication of what may be a more common and pervasive threat to your information assets: the release of classified National Security Agency (NSA) documents by Edward Snowden. Snowden, you may recall, was a contractor working for the NSA when he copied and released classified information without authorization. This wasn’t a hack from the outside; it was the job of an “insider.” (more…)

    From the Experts, Security, Solutions

    , , , , , , , ,

    Health_imageOur country’s ever-evolving healthcare landscape makes the future very unpredictable.  Changes are occurring everywhere – regulation and legislation, reimbursement, technology, medical advances, and even the way healthcare is accessed and consumed. These changes impact how healthcare is delivered, paid for and administered. As such, it is imperative that Konica Minolta take an active role in understanding the industry and provide healthcare solutions in order to help our customers prepare for a future that will look very different than it does today.  (more…)

    Content Management, From Our Experts, Marketing, Security, Solutions, Strategy, Technology

    , , , , , , , , , ,

    Print

    “Change is the only constant in life,” so said Heraclitus, the Greek philosopher, around 500 B.C. As I look toward the legal environment in 2017, that saying is alive and well thanks to the emergence of robotics, other workplace of the future solutions and artificial intelligence (AI), the next critical wave of change in law firms.

    What is different from Heraclitus’ time is the velocity at which change is occurring. Advancing law firm technology has pushed firms to move uncommonly fast to implement the changes necessary to garner the benefits that are possible for strategic growth and overall survival. The law firm of the future must address these coming influences that are re-engineering how work will be done.  What are these influences that I believe will impact the legal arena in 2017? Here are my predictions: (more…)

    Cloud, Content Management, From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , , , , ,

    acutecareprovidersIn 2013, a covered entity reported to the U.S. Department of Health and Human Services Office for Civil Rights  that one of its workstations was infected with a malware program. This resulted in the impermissible disclosure of 1,670 individuals’ electronic protected health information. The ePHI included names, addresses, Social Security numbers, dates of birth, health insurance information, diagnoses and procedure codes.

    The covered entity, a hospital in the Northeast, determined that the malware was a generic remote access Trojan that infiltrated their system, providing impermissible access to ePHI, because the organization did not have a firewall in place.

    This is a common, basic lapse in compliance of covered entities. So, let’s examine the HIPAA settlement related to this organization. to better understand how you can improve your HIPAA compliance program. (more…)

    From the Experts, Security, Solutions

    , , , , , ,

    cyber-securityGartner estimates about 6.4 billion Internet of Things (IoT) devices today, such as DVRs, surveillance cameras, and many others, all connected to the Web and all with Internet (IP) addresses. By 2020, it is expected that the number of Web-connected devices will increase to 20.8 billion.

    So, why are these numbers relevant to healthcare cyber-security?

    An IoT fact is that these devices were not designed or developed with security at their core. Further, these devices are typically not configured securely.

    IoT = Internet of Threats!

    The focus of this article is to walk through the security challenges associated with IoT devices, which are proliferating healthcare entities. We will examine four key steps that a health-care entity should take to be better positioned to address this area of emerging cyber-risk.

    Why the IoT-driven Internet Wobble on October 21 Matters in 2017 (more…)

    From the Experts, Security

    , , , , , , , , , , , , ,

    Print

    Security should be a driving force and not an afterthought for senior executives and their boards.

    It is important that senior executives require that their organization formally establish a credible cyber security program. It starts with setting strategic security objectives that must be achieved by December 31, 2016, and December 31, 2017. Think near-term, and think far! The organization must address security and compliance as a life-cycle, as a process. It will lower business risk! (more…)

    Content Management, From the Experts, Security, Strategy, Technology

    , , , , ,

    bizhub_c754_panel_kno2_silo_2_resized

    As the old adage goes: Don’t take a good thing for granted.

    How often do we do this in our personal and professional lives?  Probably more than we’d like to admit.  So when that good thing comes along, recognize it, take pride in it and promote it.  That’s precisely what we’re doing with our interoperability capabilities as they grow and become more relevant for more of our healthcare customers. (more…)

    Content Management, From the Experts, Security, Technology

    , , , , , , , ,

    How ECM Keeps Data Secure

    , Director, Enterprise Content Management

    PrintThere’s no doubt about it. Every company, no matter what size or type, has massive amounts of data and sensitive information that must be kept secure and accessible only to those who need it. There are solutions and best practices you can have in place that will ensure all of your information remains safe. Having a lack of technology and protocols to organize and protect your data is a good way to set yourself up for data security issues.

    The challenge is huge.  The answer is clear: enterprise content management (ECM).

    Data security doesn’t only have to do with information being stolen or hacked; it involves knowing where your data is located and being able to access it when needed. This is especially true when information is stored and filed on paper. The frequency of documents being misfiled and lost are higher than most people want to believe — and very costly. On average, between 2 percent and 5 percent of an organization’s files are lost or misfiled on any given day.

    Now add to this compliance regulations and audits. With the increasing levels of compliance regulations and required audits, both internal and external, keeping track of necessary documents is more important than ever. This is difficult with a system heavy on hard-copy data. Paper-heavy businesses run the risk of being compromised or losing data that could result in lawsuits and other negative repercussions.

    To combat these concerns, business executives have begun to implement firewalls and disaster recovery plans to ward off outside attacks on their data.

    Having a strategy in place is the crucial key to your protection. The bloodline of your organization is your data and that is not something you can risk.

    (more…)

    Content Management, From Our Experts, Security, Solutions

    , , , , , ,

    No Rest For The Treasure Trove

    , U.S. Legal Practice Director, All Covered

    legal pic

    As high-profile breaches continue to increase and flood the news every week, so does attention to the growing concern of protecting all types of data. Hackers have discovered that one of the easiest routes to a corporation’s data is through third parties. (more…)

    Content Management, From Our Experts, Security, Solutions, Strategy

    , , , , , , , ,

    Blog-Zina (1)

    We don’t have 12 jurors to get a consensus of what challenges and trends will impact the legal profession come the New Year, but our vast experience with law firms allows us to play judge and jury to help enlighten you. Some of these may or may not come as a surprise, but they’ll be areas that the legal industry must consider to remain safe and successful.

    For instance, we believe that cybersecurity will be the industry’s biggest challenge. We’re used to hearing news reports about breaches in the medical and retail worlds – like those from Anthem Blue Cross/Blue Shield and Target – but we never hear about breaches in the legal world. Law firms have become a veritable treasure trove for hackers in the past five to 10 years. Hackers are now getting to big corporate data through much less secure routes, such as outside counsel. Law firms must deploy advanced security measures – like those offered via All Covered Security Services – that identify and mitigate the risks to their clients’ and the firms’ assets, especially personally identifiable information (PII). (more…)

    Cloud, Content Management, From Our Experts, Security, Solutions, Technology

    , , , , , , , , , ,