• Insights
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • Talk about kicking off 2018 with a bang! In the first week of the new year, several researchers reported a newly-found vulnerability in processors designed by Intel, ARM and others: one that theoretically allows hackers to read even the most secure information on any device. (more…)

    From Our Experts, Security, Technology

    , , , , , , , , ,

    As we quickly transition into a new year, I think back on 2017 and the rash of cyber security stories that made national and international news. Ransomware like WannaCry and NotPetya, the Equifax breach, SMBv1 and SSL vulnerabilities, etc. Even a global phishing scam used a fake Konica Minolta C224e scan to email message as bait.

    Most noteworthy in the printer industry were the major campaigns launched by various MFP and print providers. As it turned out, one of the most prolific printer security campaigns actually backfired when it was discovered that the very printer vulnerabilities described in the campaign were actually discovered on their own portfolio of enterprise printers. You couldn’t make it up if you tried. (more…)

    Content Management, From Our Experts, Security, Solutions, Technology

    , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

    Konica Minolta Wins American Security Today Awards

    , Manager, Government and Education Solutions

    Konica Minolta has been expanding and transforming its business by building off our strong imaging legacy. This transformation includes everything from offering IT services to helping reshape workspaces and most recently with our Workplace of the Future™ solutions. It’s a mighty undertaking, so it’s very satisfying when a third-party comes along and acknowledges just how successful our transformation has been. I’m very pleased to say that this occurred last week when we won multiple awards in the government security sector from American Security Today (AST). (more…)

    Content Management, From the Experts, Security, Solutions, Technology

    , , , , , , , , , , , , , , ,

    I love a well-kept yard and work very hard at hiring the right company to get my yard to look great. Admittedly, I don’t have the time or expertise to spend on my yard to keep it well-trimmed with beautiful beds, so I hire a service to do the job – better than I ever could. If I lived in a climate that got snow, I’d probably hire a plowing service to “shovel me out” – not because I can’t shovel or buy my own plow, but because someone else has the machinery to do it faster and better. (more…)

    Content Management, From Our Experts, Leadership, Security, Strategy

    , , , , , , , ,

    I’m excited to be joined by Peter Wallqvist, Vice President of Strategy at iManage, for the second of a two-part blog series on legal document management solutions. Konica Minolta and All Covered — the IT Services Division of Konica Minolta — have a strategic partnership with iManage, which provides cutting-edge legal document management solutions. iManage recently acquired RAVN Systems, a UK-based company that developed an artificial intelligence (AI) platform that can organize, discover and summarize relevant information from large volumes of documents and unstructured data. (more…)

    Content Management, From Our Experts, From the Experts, Security, Solutions, Technology

    , , , , , , , , , , , , ,

    KMBS_LogoImagine a technology of bygone days that’s still a vital communications tool today, relied upon by businesses of all shapes, sizes, industries and regions worldwide, and still needed in today’s digital transformation. No, it’s not the automobile or the lightbulb. It’s fax communications. Consider this: The latest 2017 IDC Fax Trends survey confirms the vitality of fax and its continuing growth and relevancy today.  In the survey, 75 percent of total respondents expect fax usage to grow or remain the same in the next two years while in North America it’s expected to be an even higher 88 percent! (more…)

    Content Management, From Our Experts, Security, Solutions, Technology

    , , , , , , , , , , , ,

    PrintFile sharing solutions are ubiquitous now. If you run a Google search for “online file sharing services,” you’ll get pages of possibilities returned like secure file sharing, secure file transferring, virtual data rooms, Google drives and every other imaginable solution out there. In today’s high-tech world, businesses of all verticals, but especially legal, deal with sensitive data understand the importance of sharing files securely.  With the likes of Konica Minolta and Workshare file sharing solutions, we’ve come a long way in how we now protect our client and customer data. (more…)

    Content Management, From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , , , , , , ,

    Why Cyber Security Should Be Your Top Priority

    , Director of Integrated Marketing, All Covered

    eBookAs more and more core parts of our clients’ business have moved online or into the cloud, they have become increasingly concerned with cyber security. Malware, vulnerabilities and hacking have become part of their most pressing concerns, not something they’re content to simply leave to the IT guys.

    This rapidly evolving  security threat environment calls for a more comprehensive information security approach that goes beyond systems management to active protection. Thus, we’ve evolved our managed IT services and tweaked the name to go with the change: we’re now All Covered Care – Secure and Protect. (more…)

    Cloud, Content Management, From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , , ,

    Pursue Justice & Eliminate Challenges with Legal Technology

    , Director of Channel & Client Advocacy, nQueue

    nQueue_Logo_450x311px_72dpi-300x207The world is changing. It’s a fact. Think about it, in your lifetime, you may have seen computers shrink smaller yet more powerful, phones move from rotary dial and party lines to devices that comfortably fit in your hand and hold more computing power than the computers that sent men to the moon.

    What if you and your law firm haven’t kept up with the times and haven’t yet embraced the right legal technology to improve your firm’s productivity? You can bet your client has and they expect you to be not only savvy with today’s technology, but to be innovative. (more…)

    Content Management, From the Experts, Security, Solutions, Technology

    , , , , , , ,

    Blog-bizhubSecureYou may have heard about recent reports of network hackers gaining access to multifunction printers, causing headaches for IT and cyber security personnel. These stories in the news are creating a lot of noise in the industry, overstating the risks of having a printer or MFP installed within an organization’s network. Although the vulnerabilities could be a cause for concern, multifunction printer hacks are relatively harmless, causing incidents such as an MFP to “lock up” using denial of service and brute force attacks. This type of action would require an exceptional, concerted effort by a person within the firewall of an organization to attack a specific multifunction printer. Typically, a person who wanted to do cyber harm within a corporation wouldn’t spend this type of effort to attack a printing device.

    It is important to understand that these perceived network vulnerabilities can only be taken advantage of from within a company’s network environment. This means that the network hacker would need to be a company or organizational employee with private network access. The devices are not vulnerable from outside the firewall or from the Internet – unless the network is vulnerable to external attacks. If that is the case, the multifunction printer should be the least of an organization’s worries. Obviously, the first course of action must always be to secure the network.

    (more…)

    From Our Experts, Security

    , , , , , , , ,