Tag: security

8 Strategies for Building Business Resilience
2021 in Review: How Technology & BPO Benefited Business Operations
Top Digital Transformation Trends to Watch in 2022
Cybersecurity Best Practices for the Remote Office

Cybersecurity Best Practices for the Remote Office

Many organizations have embraced remote and hybrid workstyles as a result of the COVID-19 pandemic. While remote work structures can lead to increased productivity, they can also lead to increased cyber risk. Since 2019, ransomware attacks have risen by 62% worldwide, and by a staggering 158% in North America alone, according to cybersecurity firm SonicWall’s…

Digital Transformation in Banking Whitepaper: Keeping Up with the FinTech Disrupters

Digital Transformation in Banking Whitepaper: Keeping Up with the FinTech Disrupters

The world’s biggest banks are pushing back against the industry-disrupting competition from online financial startups with billions of dollars of investments in digital technology, Bloomberg reports. Earlier this year, Spain’s Banco Santander SA announced plans to spend $22 billion over the next four years to stay competitive. In the U.S. J.P. Morgan Chase & Co….

HR Document Security: How to Secure Personnel Files

HR Document Security: How to Secure Personnel Files

HR Directors are under enough pressure to help ensure that employees are happy and productive. The last thing they need to worry about is secure access to employee files. Here’s how this aspect of their job can be made a whole lot easier. Cloud Document Management Cloud document management software is the first step for…

ApplicationXtender 8.0, Technically Speaking

ApplicationXtender 8.0, Technically Speaking

Guest Blog: Bill Bastian – Manager, Technical Services ApplicationXtender (AX) 8.0 is now available. This is the upgrade we’ve all been waiting for, especially myself. AX 8.0 offers a sleek new interface, some sweet new features and better performance. This is an evolutionary leap forward that positions the platform for rapid adoption into mainstream processing…

How to Ensure Secure Document Submission Beyond SFTP

How to Ensure Secure Document Submission Beyond SFTP

Whether you need to share a contract or application to a partner, upload mortgage documents to your quality control compliance advisor or send any other confidential information electronically, SFTP is not enough to guarantee secure access. Below are the limitations and how to overcome them. Limitations of SFTP Whoever has the SFTP address, login and…

Security Breaches, Data Leaks and Cyber Attacks… Oh, My!

Security Breaches, Data Leaks and Cyber Attacks… Oh, My!

It seems every time we turn on the news or turn our heads we hear about a security breach, or as Ashley Madison calls it “cyber terrorism.” As any business attempts to grow in today’s technology-driven world, one of the top issues that any CEO or business manager must control and continue to proactively address…