• Categories
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • KMBS_LogoImagine a technology of bygone days that’s still a vital communications tool today, relied upon by businesses of all shapes, sizes, industries and regions worldwide, and still needed in today’s digital transformation. No, it’s not the automobile or the lightbulb. It’s fax communications. Consider this: The latest 2017 IDC Fax Trends survey confirms the vitality of fax and its continuing growth and relevancy today.  In the survey, 75 percent of total respondents expect fax usage to grow or remain the same in the next two years while in North America it’s expected to be an even higher 88 percent! (more…)

    Content Management, From Our Experts, Security, Solutions, Technology

    , , , , , , , , , , , ,

    Blog-IntegratedServicesPrint and workflow automation are at the forefront of all discussions surrounding the print shop of the future — particularly regarding the front and back end systems. In the past, the front- and back-end have been two distinct systems, basically what you see and what you don’t see. Now, they are converging together driven by the need for print automation solutions. A better understanding of these trends can help you when working with a customer and presenting print shop automation solutions and services. Today, we explain a brief overview of these industry changes. (more…)

    Content Management, From Our Experts, Solutions, Strategy, Technology

    , , , , , , , , , ,

    PrintFile sharing solutions are ubiquitous now. If you run a Google search for “online file sharing services,” you’ll get pages of possibilities returned like secure file sharing, secure file transferring, virtual data rooms, Google drives and every other imaginable solution out there. In today’s high-tech world, businesses of all verticals, but especially legal, deal with sensitive data understand the importance of sharing files securely.  With the likes of Konica Minolta and Workshare file sharing solutions, we’ve come a long way in how we now protect our client and customer data. (more…)

    Content Management, From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , , , , , , ,

    Why Cyber Security Should Be Your Top Priority

    , Director of Integrated Marketing, All Covered

    eBookAs more and more core parts of our clients’ business have moved online or into the cloud, they have become increasingly concerned with cyber security. Malware, vulnerabilities and hacking have become part of their most pressing concerns, not something they’re content to simply leave to the IT guys.

    This rapidly evolving  security threat environment calls for a more comprehensive information security approach that goes beyond systems management to active protection. Thus, we’ve evolved our managed IT services and tweaked the name to go with the change: we’re now All Covered Care – Secure and Protect. (more…)

    Cloud, Content Management, From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , , ,

    Blog-ECM1_resizedThe Association for Information and Image Management (AIIM) recently conducted a survey to better understand the needs of businesses regarding information management and whether they’ve made enterprise content management part of their digital transformation in 2017. According to the survey, return on investment (ROI), increased productivity, compliance and risk mitigation are key focus areas for businesses that are looking to better manage their information. (more…)

    Content Management, Customer Experience, From Our Experts, Solutions, Technology

    , , , , , , , , ,

    Print Management: The Forgotten Revenue Stream

    , Solutions Product Marketing Manager

    KMBS_LogoGenerating a steady stream of revenue and ensuring document security are big objectives for a business of any size to survive. But many of them – especially small businesses – neglect to adopt a comprehensive means for tracking multifunction printer (MFP) usage and recovering costs. Additionally, many businesses don’t take the necessary precautions to protect and secure files across their organization. The result? They’re tossing a bundle of valuable funds into the wind while leaving their organization open to security breaches and threats. (more…)

    Content Management, From Our Experts, Solutions, Technology

    , , , , , ,

    Blog-bizhubSecureYou may have heard about recent reports of network hackers gaining access to multifunction printers, causing headaches for IT and cyber security personnel. These stories in the news are creating a lot of noise in the industry, overstating the risks of having a printer or MFP installed within an organization’s network. Although the vulnerabilities could be a cause for concern, multifunction printer hacks are relatively harmless, causing incidents such as an MFP to “lock up” using denial of service and brute force attacks. This type of action would require an exceptional, concerted effort by a person within the firewall of an organization to attack a specific multifunction printer. Typically, a person who wanted to do cyber harm within a corporation wouldn’t spend this type of effort to attack a printing device.

    It is important to understand that these perceived network vulnerabilities can only be taken advantage of from within a company’s network environment. This means that the network hacker would need to be a company or organizational employee with private network access. The devices are not vulnerable from outside the firewall or from the Internet – unless the network is vulnerable to external attacks. If that is the case, the multifunction printer should be the least of an organization’s worries. Obviously, the first course of action must always be to secure the network.

    (more…)

    From Our Experts, Security

    , , , , , , , ,

    Blog-WotFLast year, Konica Minolta launched a new portfolio called “Workplace of the Future,™” which integrates existing solutions with new technologies from Konica Minolta’s Business Innovation Center in Silicon Valley. As a founding member of this practice, I have had the opportunity to become fully immersed in the trends and opportunities in the connected office sector through conversations with 75+ startup leaders, extensive industry research, and an active presence at industry conferences. (more…)

    Cloud, Content Management, From the Experts, Solutions, Strategy, Technology

    , , , , , , ,

    How ECM Will Evolve in 2017

    , Director, Enterprise Content Management

    Blog-ECM1_resized

    As I sit here to write this post, I’ve pulled up my favorite Jazz station from the Amazon Prime App on my laptop and I hear Frank Sinatra’s, “The Best is Yet to Come” – a favorite.

    The best is yet to come, and won’t that be fine
    You think you’ve seen the sun, but you ain’t seen it shine

    These lyrics resonate with me as I formulate my predictions for Enterprise Content Management (ECM) for 2017. We’ve had a great year in 2016 providing ECM solutions and services to our customers.  But, in 2017, we expect to bring greater growth and expansion for customers, employees and the industry. (more…)

    Cloud, Content Management, From Our Experts, Solutions, Strategy, Technology

    , , , , , ,

    IP Theft and the Insider Threat

    , Managing Director, Computer Forensics

    PrecisionDiscovery_remarketingad_250x250_0831Your company has undoubtedly invested significant time, energy and money to develop intellectual property (IP) – unique ideas, methodologies and trade secrets – as well as other intangible assets – customer lists, plans for future products, non-public financial information, contracts with suppliers, software source code, and so on.

    These information assets are extremely valuable, and often what differentiate you from the competition. In the wrong hands – the hands of a competitor, for example – the damage could be catastrophic.

    IT professionals lie awake at night making sure their networks are protected from outside threats. And yet you don’t have to look too far to find high-profile examples of security breaches. The 2014 hacking of Sony Pictures and the release of thousands of private emails and documents was both costly and embarrassing for the company.

    Perhaps, it’s another headline-grabbing event that offers an indication of what may be a more common and pervasive threat to your information assets: the release of classified National Security Agency (NSA) documents by Edward Snowden. Snowden, you may recall, was a contractor working for the NSA when he copied and released classified information without authorization. This wasn’t a hack from the outside; it was the job of an “insider.” (more…)

    From the Experts, Security, Solutions

    , , , , , , , , ,