“Show me the money” – on demand!

By |June 21st, 2018|

It’s a new world in the banking industry. Paper statements, sent each month by mail, have been the mainstay of banks and other institutions for decades, but consumers now expect immediate access to information about transactions, balances, previous checks and more at any time of the day or night. While a traditional Print Stream […]

9 Evaluation Points to Assess Your Information Strength

By |September 26th, 2016|

Information Strength is a state of advantage achieved through, both strategic and tactical implementation of archiving best-practices, security protocols and governance policies that protect the value of your enterprise content and uphold the power and promise of information governance.  But why is it important?  It provides feedback to drive an understanding of your information […]

Future Proofing for the Check-pocalypse

By |September 8th, 2016|

I recently read yet another article predicting the end of the check. As a twist on this recurring topic, the author was trying to accurately calculate when the last check will process. The recurring and entertaining press coverage of the “check-pocalypse” is encouraged by our casual observation of individual consumer transactions. During a recent […]

ILTA 2016 Information Governance Survey

By |March 22nd, 2016|

Information governance is BIG.

And, not just in the sense of “big data” – it’s a big concept.  It’s such a broad concept, that it means many things to many people depending on the nature of the organization, the organization’s main business drivers, and a person’s role within the organization.

While “big” may be a simple […]

5 Steps for Cybersecurity Success

By |October 27th, 2015|

Well-coordinated cyber attacks against American interests are increasing in number, frequency and sophistication, as are the costs to businesses related to such attacks. Sony Pictures, Home Depot, Anthem, Target Corp. and the U.S. Office of Personnel, to name just a few, have all been the target of recent cyberattacks.  The authority to regulate corporate […]

eDiscovery Meets Information Governance in the Cloud

By |August 6th, 2015|

Organizations that don’t develop information governance and e-Discovery strategies before they move their business processes to the cloud could face disaster down the road.

That was the premise of the July 28 Google Hangout exploring e-discovery and information governance in the cloud presented by the Information Governance Initiative.

Hosted by Barclay T. Blair, founder and executive […]

eDiscovery in a Cloud-First World

By |July 23rd, 2015|

Most large organizations are feeling the pressure to modernize their infrastructures and move to the cloud. If your organization is not already knee deep in transformation, you are likely planning a move sometime in the near future. In addition to IT transformation, most organizations are also evaluating business and information systems that can be […]

Turning Up the Heat on Information Governance

By |July 21st, 2015|

Over the years, many different names have been used to describe the pro-active phase of the eDiscovery process – whether records management, information management or now what the Electronic Discovery Reference Model (EDRM) refers to as information governance. This part of the model can both simplify the discovery process as well as eliminate unnecessary […]

Hold Up! Reassess Processes When Retooling Hold Solutions

By |March 3rd, 2015|

As organizations modernize their infrastructures, systems and applications, the need to consider the impact on daily business processes can also be paramount to their success. Modernization provides an opportunity for a business to update processes to gain efficiencies through automation as well as new functionality that may become available.

This is no different when retooling […]

Insight to Action

By |February 26th, 2015|

An organization’s content is one of its largest assets; however it can also become one of its largest risks. With the drastic changes in technology over the last decade and use of tools such as tablets, smart phones and social media, the proper management and preservation of data have both suffered – and in […]