Blog

Blog

Cracking the Problem of Endpoint Security

Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Blog

Concerns in Creating a Paperless Office

Identified as a key trend of the future and a way to improve business efficiency, the idea of a “paperless” office (or more realistically, a “less paper” office) is spreading relatively slowly. Why is that?
Blog

3 Ways Digital Document Management Helps Financial Institutions

Secure document management is an important consideration for any business, but for financial instutions in particular, keeping data secure is critical to keeping business running smoothly and clients happy. Learn how digital document management gives financial instutions the competitive edge they need to succeed.