5 signs you must update your HR processes
From consumer technologies to corporate systems, one of the biggest challenges to implementing new software is user resistance. Users often have an aversion to parting wi...
FAQs to address the threat of ransomware
When a cyber threat grows in magnitude by 35 times in one year, and continues to become even more prevalent the next, every organization should pay attention. Cyber crimi...
Don’t be a data breach security headline
Healthcare Data Privacy and Security Is a Top Priority.
If you’re anything
like the healthcare C-level leaders we’ve spoken with recently, chances are
good that, i...
Preventing data breaches: is it possible?
Data breaches get a lot of attention and are a constant source of stress for IT and executive management. And there are a lot of articles about “preventing” data breaches...
How CFOs can reduce information security risk
Data security isn’t just something that your IT team needs to address.
Since a breach can impact every area of an organisation, keeping sensitive data secure is also a t...
5 Server security concerns you need to know
Server security is dependent on many factors, including operating system and purpose. But some things are universal.
Server security is an ongoing concern of IT, even w...
Keep your cloud secure: Top security challenges
Making the best use of cloud technology is near the top on IT's list these days.
Whether it’s making the decision to jump into the cloud game or deciding how to best use...
Ricoh can help governments remain compliant
One of the most important things which local governments deal with is Freedom of Information & Protection of Privacy Act (FIPPA) requests. Governments often want to r...