• Insights
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • How to Get the Best Bang for the Buck

    , Practice Director, Financial Division

    When Hiring a vISO, It All Starts with a Relationship

    When I was consulting I knew the best relationships I had because they would call me at any hour with random questions where they needed an immediate response. They valued the opinion and the intellectual capital supporting it. They were not embarrassed to ask and were always curious to learn. With this type of working relationship the client contact was comfortable putting me in front of the board of directors, because they were confident that I would interact with the board in the same capacity that they would.

    (more…)

    From the Experts

    , , , , , ,

    In 2010, Konica Minolta implemented a vertical marketing strategy and hired individuals like myself who were not from the office technology arena but whose expertise was in fields such as legal, healthcare, government, education, among others. Since that time, we have seen many of our dealers follow suit with vertical markets for their business. (more…)

    Customer Experience, From the Experts, Marketing, Strategy

    , , , , , , , , , , , ,

    Konica Minolta Wins American Security Today Awards

    , Manager, Government and Education Solutions

    Konica Minolta has been expanding and transforming its business by building off our strong imaging legacy. This transformation includes everything from offering IT services to helping reshape workspaces and most recently with our Workplace of the Future™ solutions. It’s a mighty undertaking, so it’s very satisfying when a third-party comes along and acknowledges just how successful our transformation has been. I’m very pleased to say that this occurred last week when we won multiple awards in the government security sector from American Security Today (AST). (more…)

    Content Management, From the Experts, Security, Solutions, Technology

    , , , , , , , , , , , , , , ,

    I’m excited to be joined by Peter Wallqvist, Vice President of Strategy at iManage, for the second of a two-part blog series on legal document management solutions. Konica Minolta and All Covered — the IT Services Division of Konica Minolta — have a strategic partnership with iManage, which provides cutting-edge legal document management solutions. iManage recently acquired RAVN Systems, a UK-based company that developed an artificial intelligence (AI) platform that can organize, discover and summarize relevant information from large volumes of documents and unstructured data. (more…)

    Content Management, From Our Experts, From the Experts, Security, Solutions, Technology

    , , , , , , , , , , , , ,

    Pursue Justice & Eliminate Challenges with Legal Technology

    , Director of Channel & Client Advocacy, nQueue

    nQueue_Logo_450x311px_72dpi-300x207The world is changing. It’s a fact. Think about it, in your lifetime, you may have seen computers shrink smaller yet more powerful, phones move from rotary dial and party lines to devices that comfortably fit in your hand and hold more computing power than the computers that sent men to the moon.

    What if you and your law firm haven’t kept up with the times and haven’t yet embraced the right legal technology to improve your firm’s productivity? You can bet your client has and they expect you to be not only savvy with today’s technology, but to be innovative. (more…)

    Content Management, From the Experts, Security, Solutions, Technology

    , , , , , , ,

    Blog-WotFLast year, Konica Minolta launched a new portfolio called “Workplace of the Future,™” which integrates existing solutions with new technologies from Konica Minolta’s Business Innovation Center in Silicon Valley. As a founding member of this practice, I have had the opportunity to become fully immersed in the trends and opportunities in the connected office sector through conversations with 75+ startup leaders, extensive industry research, and an active presence at industry conferences. (more…)

    Cloud, Content Management, From the Experts, Solutions, Strategy, Technology

    , , , , , , ,

    IP Theft and the Insider Threat

    , Managing Director, Computer Forensics

    PrecisionDiscovery_remarketingad_250x250_0831Your company has undoubtedly invested significant time, energy and money to develop intellectual property (IP) – unique ideas, methodologies and trade secrets – as well as other intangible assets – customer lists, plans for future products, non-public financial information, contracts with suppliers, software source code, and so on.

    These information assets are extremely valuable, and often what differentiate you from the competition. In the wrong hands – the hands of a competitor, for example – the damage could be catastrophic.

    IT professionals lie awake at night making sure their networks are protected from outside threats. And yet you don’t have to look too far to find high-profile examples of security breaches. The 2014 hacking of Sony Pictures and the release of thousands of private emails and documents was both costly and embarrassing for the company.

    Perhaps, it’s another headline-grabbing event that offers an indication of what may be a more common and pervasive threat to your information assets: the release of classified National Security Agency (NSA) documents by Edward Snowden. Snowden, you may recall, was a contractor working for the NSA when he copied and released classified information without authorization. This wasn’t a hack from the outside; it was the job of an “insider.” (more…)

    From the Experts, Security, Solutions

    , , , , , , , , ,

    acutecareprovidersIn 2013, a covered entity reported to the U.S. Department of Health and Human Services Office for Civil Rights  that one of its workstations was infected with a malware program. This resulted in the impermissible disclosure of 1,670 individuals’ electronic protected health information. The ePHI included names, addresses, Social Security numbers, dates of birth, health insurance information, diagnoses and procedure codes.

    The covered entity, a hospital in the Northeast, determined that the malware was a generic remote access Trojan that infiltrated their system, providing impermissible access to ePHI, because the organization did not have a firewall in place.

    This is a common, basic lapse in compliance of covered entities. So, let’s examine the HIPAA settlement related to this organization. to better understand how you can improve your HIPAA compliance program. (more…)

    From the Experts, Security, Solutions

    , , , , , ,

    cyber-securityGartner estimates about 6.4 billion Internet of Things (IoT) devices today, such as DVRs, surveillance cameras, and many others, all connected to the Web and all with Internet (IP) addresses. By 2020, it is expected that the number of Web-connected devices will increase to 20.8 billion.

    So, why are these numbers relevant to healthcare cyber-security?

    An IoT fact is that these devices were not designed or developed with security at their core. Further, these devices are typically not configured securely.

    IoT = Internet of Threats!

    The focus of this article is to walk through the security challenges associated with IoT devices, which are proliferating healthcare entities. We will examine four key steps that a health-care entity should take to be better positioned to address this area of emerging cyber-risk.

    Why the IoT-driven Internet Wobble on October 21 Matters in 2017 (more…)

    From the Experts, Security

    , , , , , , , , , , , , ,

    Print

    Security should be a driving force and not an afterthought for senior executives and their boards.

    It is important that senior executives require that their organization formally establish a credible cyber security program. It starts with setting strategic security objectives that must be achieved by December 31, 2016, and December 31, 2017. Think near-term, and think far! The organization must address security and compliance as a life-cycle, as a process. It will lower business risk! (more…)

    Content Management, From the Experts, Security, Strategy, Technology

    , , , , , ,