Tag Archive for: security

How to Manage Your Reputation in the Wake of a Cybersecurity Incident

,
After a cyber attack, customer and partner interactions can determine whether a company survives. by Eden Gillott Bowe Twitter Eden Gillott Bowe, president of reputation management firm Gillott Communications,…

4 Tactics to Make Sure Your Disaster Recovery Plans Are Up to Date

,
Preparedness can mean the difference between managing through a crisis and succumbing in the wake of a catastrophe for your business. by Neil Bright Neil Bright is a research scientist and chief HPC architect at the…

Xerox Recognized for Innovative Approaches to Cyber Security

,
Security Services Group earns two CSO50 awards OCT 25, 2017 — SOFTWARE, SOLUTIONS Norwalk, Conn. —  The Xerox Global Security Services group has been selected as a recipient of the sixth annual CSO50 Awards for its efforts to make…

Why a Risk-Based Approach Leads to Effective Cybersecurity

A holistic assessment of threats and vulnerabilities helps an organization appropriately prioritize and mitigate its risks.   Organizations have different needs for cybersecurity and thus adopt different strategies for identifying…

Cybersecurity on a Budget: Here are 3 Tips From an Expert

Jan 10, 2018 by Annie Pilon In Technology Trends 1 Cybersecurity should be a major focus for small businesses in 2018. And it doesn’t need to be expensive. SiteLock President Neill Feather recently shared some predictions about…

How to control Document Security

,
Proactive Threat Intelligence: How To Take Charge Of Document Security By Carro Ford|Jan 4, 2018|analytics, document management, MPS, Security|0 Comments Cybersecurity has become a constant worry for…

Serverless Cloud Computing

Serverless: The future of cloud computing? While the cloud lends companies more agility, New York Times CTO Nick Rockwell says event-triggered computing cuts cost and enables more efficient application development. Welcome to the serverless…

The Modern Guide to Mobile Printing

, ,
No longer are workers relying only on their desktops and laptops to read email, share documents or even print. Instead, they’re looking for ways to access printers from home, a field location, the customer’s site, or their seat on…