278 Lotus blogs updated hourly. Who will post next? Home | Blogs | Search | About 
 
Latest 7 Posts
FOIA reforms are on the way, are you ready?
Wed, Jun 22nd 2016 6
Breach of Security: Measuring the Cost of Cyber Crime
Wed, Jun 8th 2016 5
How to Survive Data Discovery in the Digital age
Mon, May 9th 2016 6
Information Governance and the Internet of Things
Mon, May 9th 2016 7
WHITE PAPER: Implementing Office 365: Inherent Features and the Need for Third Party Tools
Wed, May 4th 2016 6
Don’t be next! Minecraft Third-Party Suffers Security Breach
Fri, Apr 29th 2016 8
8 Reasons to visit Pittsburgh, PA
Tue, Apr 26th 2016 7
Top 10
What’s Holding Up Your Legal Hold?
Mon, Jun 22nd 2015 10
Discovery Attender: Automatic Labels
Wed, Dec 9th 2015 10
Off the topic: Become a tailgating all-star
Thu, Nov 5th 2015 8
Don’t be next! Minecraft Third-Party Suffers Security Breach
Fri, Apr 29th 2016 8
Off-the-topic: College classes for free
Thu, Apr 24th 2014 7
From LotusScript to Java: Part 3
Fri, May 2nd 2014 7
[Video] Sherpa Altitude IG: An Overview
Mon, Oct 26th 2015 7
5 Steps to Take When You Receive A Corporate Policy Directive
Thu, Dec 3rd 2015 7
8 Reasons to visit Pittsburgh, PA
Tue, Apr 26th 2016 7
Information Governance and the Internet of Things
Mon, May 9th 2016 7




Recent Blog Posts
6
FOIA reforms are on the way, are you ready?
Wed, Jun 22nd 2016 10:06a   Rick Wilson
If you are employed by a federal government agency, then you are probably well aware of FOIA, or the Freedom of Information Act. FOIA was originally signed into law during the 1960’s by then President Lyndon B. Johnson to establish a process whereby citizens can request copies of governmental records that are not published in the Federal Registry. Agencies, in turn, are required to provide this information in a timely fashion (usually 20 days). Although FOIA is a federal mandate, it has also
5
Breach of Security: Measuring the Cost of Cyber Crime
Wed, Jun 8th 2016 10:10a   Harvey Coblin
Cybercrime is an increasing threat. Estimates vary widely, but according to a recent Reuters article, “Cyber crime costs (the) global economy $445 billion a year.” Other estimates place the costs as high as $1 trillion. The reason estimates vary is due in part to the fact that cybercrime can come in many forms, ranging from denial of service, theft of credit card or other financial information  (PCI/PII), industrial espionage, all the way up the ladder to state-sponsored terrorism
6
How to Survive Data Discovery in the Digital age
Mon, May 9th 2016 10:42a   Jeff Tujetsch
eDiscovery. That one word will make IT professionals start shaking. But, as the most technologically advanced civilization in the world, why is that? Is it because of what will be found? Is it because of what they are asked to search? Or is it because of the search terms they are asked to use? Well, the answer to each question is ‘Yes’. Data Discovery has grown into a multi-billion dollar world-wide business. Though the United States might lead the way because of our litigiousness, w
7
Information Governance and the Internet of Things
Mon, May 9th 2016 10:28a   Marta Farensbach
Machines talking to machines.  Once the province of science fiction, the Internet of Things is set to transform industries as visionaries incorporate its wide reach into everyday objects. On a very simple level, the Internet of Things (IoT) describes the freeing of communication from the domain of computers and smart phones by allowing all types of devices to share information across the internet.  ‘Things’ like cars, fridges, health monitors, water meters and so much more can be empower
6
WHITE PAPER: Implementing Office 365: Inherent Features and the Need for Third Party Tools
Wed, May 4th 2016 9:59a   Kayla Badini
In this white paper, the topic of Office 365 and complementary solutions will be discussed; insights will be offered on a business’ future migration plans and knowing the options available. One will learn:  Why Office 365 is a compelling platform, Examples of productivity integrations, About the importance of information governance integration, Supplementing with third party software Click here to download this white paper! The post WHITE PAPER: Implementing Office 365: Inherent Features an
8
Don’t be next! Minecraft Third-Party Suffers Security Breach
Fri, Apr 29th 2016 9:04a   Sherpa Software
By now, you have heard of the security breach suffered by a Minecraft third party called Lifeboat which caused roughly 7 million user passwords to be penetrated or hacked.  The even more unfortunate part? It happened months before Lifeboat admitted to the breach.  By not being transparent, users were put at risk for further breaches.  This lack of communication could have affected users who use the same password for multiple accounts and brands, like Lifeboat, need to understand that breaches
7
8 Reasons to visit Pittsburgh, PA
Tue, Apr 26th 2016 4:31p   Kayla Badini
Pittsburgh marathon weekend is upon us and this city is about to have hundreds of guest cross one of the many bridges to participate in the DICK’S Sporting Goods Pittsburgh Marathon, Half Marathon, Relay and more.  Once you have picked up your race packet and explored the David L. Lawrence Convention Center at the GNC Live Well Pittsburgh Health and Fitness Expo full of vendors, entertainment, etc., you may want to spend your evening exploring what Pittsburgh has to offer.  Not joining us fo
6
How IT can take the lead in Information Governance projects
Wed, Apr 20th 2016 9:09a   Rick Wilson
Instituting a structured information governance (IG) program has evolved from being little more than an interesting research project to a business critical initiative within many organizations. In fact, there is a groundswell of support building for formalizing the leadership role of Chief Information Governance Officer (CIGO) within the corporate hierarchy. Many resources, including Sherpa’s own white paper series “Building a Corporate Information Governance Program” and the EDRM
5
How IT can meet the demands of eDiscovery & Policy Enforcement
Tue, Apr 12th 2016 11:06a   Harvey Coblin
A company’s email system is arguably the center of their corporate communications. Not only is it the centerpiece in the actual message content, but also as a mechanism for sharing files and documents that can be transmitted and retransmitted across the organization. As such, an email system is a likely target for eDiscovery requests in the event of litigation. For companies starting down the path of developing an information governance program, including records retention and eDiscovery (or a
5
WHITE PAPER: An Introduction to PCI and PII: Securing Your Organization’s Data
Tue, Mar 29th 2016 8:32a   Kayla Badini
Just about every day, the national headlines include stories about data breaches that have compromised the security of thousands or even millions of confidential electronic records, often containing credit card or social security numbers. Usually, this occurs at organizations found to be in violation of various regulations or industry standards designed to prevent such incursions.  These notable hacks and thefts have prompted organizations to look to their own policies to avoid becoming the nex




Created and Maintained by Yancy Lent - About - Planet Lotus Blog - Advertising - Mobile Edition