Improve Security and Compliance by Migrating PST Files

By |2020-06-12T16:20:34-04:00February 26th, 2020|Email Migration, Email Policy|

Once upon a time, all major email systems used “personal storage tables,” commonly known as PST files. In fact, many organizations still use them to back up or archive email data. However, that practice no longer makes sense in today’s compliance-conscious and security-focused environment. Instead, consider migrating PST files to Office 365 or other centrally managed archival solution. Why Organizations Should Eliminate PST Files PST files once performed a vital function. Twenty years ago, network connections proved unreliable and slow, and online storage cost a great deal. With PST files, users could store email locally. Thus, even if the network

Comments Off on Improve Security and Compliance by Migrating PST Files

Migrating from Exchange 2010 to Improve Security and Productivity

By |2020-06-15T10:36:11-04:00February 19th, 2020|Email Migration|

Last fall, Microsoft announced that it would extend the end-of-life date for Exchange 2010 until October 2020. While the announcement brought a measure of relief for organizations under a time crunch, October will arrive in no time. If you have not already upgraded, now is the time to get started with your Exchange migration. To help you plan your migration, you need to understand the impact of Exchange 2010 end of life. Then, you will need to decide the best migration path for your organization. That is, you can stay on-premises and upgrade to Office 2019. Or, you can take

Comments Off on Migrating from Exchange 2010 to Improve Security and Productivity

Pain free Legacy Archive Migrations

By |2020-06-15T10:40:33-04:00February 12th, 2020|Email Migration, Office 365 and Migration|

In the early 2000s, spurred by the Sarbanes-Oxley Act, companies turned their focus to email archiving. On-premises archiving solutions such as EMC SourceOne and Enterprise Vault dominated the scene until 2010. Now, as many of these systems reach end of life, companies must navigate legacy archive migrations or risk losing critical information. Explore the Options Organizations with legacy archive systems must make a choice. These solutions no longer provide necessary functionality. At the same time, regulatory compliance demands email retention, leaving companies with limited options for addressing data in legacy systems. One option involves migrating the entire email archive to

Comments Off on Pain free Legacy Archive Migrations

Determine the Future of Your Legacy Email Archiving Solution

By |2020-06-15T10:42:02-04:00February 5th, 2020|Email Migration, Office 365 and Migration|

Over a decade ago, your organization purchased a state-of-the-art archiving solution to help you save space and achieve regulatory compliance. But technology marched on quickly, and that legacy email archiving solution no longer meets your needs. You must decide whether to limp along with an outdated and poorly-supported product or migrate to a modern solution. Email archiving systems like SourceOne and Enterprise Vault led the industry in 2009. But with mass migration to the cloud, these solutions quickly lost ground to more up-to-date technology. Organizations moved their email operations to nimble cloud services such as Office 365, in some cases

Comments Off on Determine the Future of Your Legacy Email Archiving Solution

10 ways to keep your data private

By |2020-06-15T10:51:34-04:00January 30th, 2020|Safety and Cyber Security|

10 ways to keep your data private used with permission from Norton by Symantec The Internet has blurred the lines between real world and the virtual one. Technology is barreling into our hands through smartphones at an unbelievable pace. This is good for productivity and progress, but it makes it easy for thieves to do their job. The anonymity and location independence that comes with the Internet muddles the moral character of even the most ethical person. There’s no assuming your phone and the information it stores is safe from the malicious intentions of the human mind. Remember, the first

Comments Off on 10 ways to keep your data private

Proactive Approach Eases Mobile eDiscovery Challenges

By |2020-06-15T10:52:56-04:00January 29th, 2020|eDiscovery, Information Governance and Management|

Remember the old days, when eDiscovery involved searching email servers, PCs and shared folders on the network? Mobile technology has changed all of that. Traditional collection methods prove woefully insufficient to address the complexities of today’s information environment. Legal teams must stay up to date to meet mobile eDiscovery challenges. Studies show that 90 percent of today’s workers use mobile devices to conduct business. They check email on their smartphones, handle sales meetings from a laptop or carry out business conversations through messaging. Any of this information may prove relevant in the case of litigation. But several factors make collecting

Comments Off on Proactive Approach Eases Mobile eDiscovery Challenges

Control Mobile Data: Information Governance Essential

By |2020-06-15T11:18:58-04:00January 22nd, 2020|Cyber-Security, Information Governance and Management|

Information governance to control mobile data and reduce the associated costs of eDiscovery becomes essential. One of the biggest and costliest issues facing organizations under legal litigation is the ability to accurately provide electronic records as evidence when requested by the courts in eDiscovery. Organizations either have no idea what email or electronic document data exists in their systems and employee devices or where that data may reside. The Challenge of Mobile Data In today’s global communications environment, electronic messages can circumnavigate the globe in seconds. Messages can exist on cellular telephones, PDA’s, laptops, home computers and backup tapes. And

Comments Off on Control Mobile Data: Information Governance Essential

5 Benefits of Data Governance for SMB Retailers

By |2020-06-01T09:02:09-04:00January 15th, 2020|Data Compliance, Information Governance and Management|

2020 ups the privacy ante for businesses in the United States, with tough new privacy laws taking effect in California and New York. Small businesses may qualify for exemptions from specific regulations. However, the focus on information management brings an opportunity to harness key business benefits of data governance for SMB retailers. 1. Protect Valuable Assets Just two years ago, The Economist pronounced the world’s most valuable resource to be not oil, but data. In retail, data powers all aspects of the business, from sales and marketing to HR and customer service. When retail businesses treat data as an asset,

Comments Off on 5 Benefits of Data Governance for SMB Retailers

6 Steps to Privacy Law Compliance for Retailers

By |2020-06-01T09:05:09-04:00January 8th, 2020|Data Compliance, Information Governance and Management, Privacy|

The dawn of 2020 brought more than winter weather and New Year’s resolutions. Retailers must now demonstrate compliance with information privacy laws in the US, such as the California Consumer Privacy Act (CCPA) and, soon, New York’s SHIELD law. With strict customer privacy laws, retail information governance to achieve privacy law compliance takes on a key strategic role. For instance, CCPA mandates that businesses provide consumers control over their private information. That is, consumers can request disclosure of all personal data regarding themselves and their households. They can opt out of the sale of that data, and they can request

Comments Off on 6 Steps to Privacy Law Compliance for Retailers

Healthcare Cyber Security Best Practices to Protect Patient Data in 2020

By |2020-05-22T04:50:59-04:00January 3rd, 2020|Cyber-Security|

In recent years, hackers have turned their attention to healthcare organizations. Not only do hospitals store valuable personal data, but they often underspend on cyber security. This makes them highly attractive targets. Investing in solid healthcare cyber-security protects essential data and ensures regulatory compliance. More importantly, it can quite literally save lives. Late last year, East Ohio Regional Hospital discovered a ransomware attack. Thanks to multi-layer defense systems and reliable backups, the hospital managed to recover with minimal damage. Other hospitals around the country have not proven so lucky. From disruption of services to exposure and loss of critical patient

Comments Off on Healthcare Cyber Security Best Practices to Protect Patient Data in 2020
Go to Top