Security is a major issue for most corporations these days, and compliance is a critical component of security as well as a complex issue in its own right. We asked several leaders in the industry some questions about what organizations are doing right, what they can do better, and what they are not doing at all.

by Nancy Van Elsacker, TOPdesk

Virtually every day organizations seek ways to provide better customer support by having departments collaborate more closely. A common complaint is that employees have trouble working together with colleagues from other departments because it almost feels like they’re speaking different languages. This is exactly the kind of problem a shared service management model can help with. Realizing more intensive collaboration is the first step toward more professional services. This is not only good for the customer, but it benefits your employees as well. Thus, the following are several examples to show how organizations navigated the path to more intensive collaboration and the benefits they enjoyed.

by Andy Jones, Xerox

Financial institutions like banks and insurance companies collect, store and transmit an incredible amount of customer personal information, including social security numbers, account numbers and transaction history. This makes them a ripe target for theft and fraudulent activity. According to Gemalto, a leader in digital security, more than 1 billion data records were breached last year alone. 60 Minutes correspondent Bill Whitaker went so far as to deem 2014 “the year of the data breach.”

by Hiro Imamura, Canon U.S.A.

Throughout a regular business day, a vast amount of confidential business information circulates around an organization, from desk to desk and inbox to inbox. As employees carry out their daily tasks, transporting data in the form of both paper and electronic documents, it raises the question: How can we be sure this information ends up in the right hands?

by Paul Hampton, Alfresco

Businesses are increasingly concerned about compliance due to the myriad standards, agreements, regulations, legislation and mandates governing their industries. But compliance is simply a ticking of a box. Software standards met – check. Licensing agreement honored — check. Records management mandate met – check.

by Joanne E. Novak, Konica Minolta

Business processing problems come in all shapes and sizes. Accounts Payable and Claims Processing is looking to go paperless for automated, streamlined workflows. Human Resources and Contract managers are looking for collaboration tools for version control and tracking. Meanwhile, everyone is afraid of external and internal security breaches or being non-compliant for audits and meeting regulatory requirements. Whether it’s business intelligence or confidential patient information, your management and safeguarding of content is critical without compromising information accessibility. 

by Kevin Craine

It has happened over and over this year, and the year before that — data breaches of major companies and institutions. The most recent headline-maker was Experian, one of the largest data brokers and credit agencies in the world, hacked by cyber-thieves who gained access to approximately 15 million customer accounts. Among them were customers of cellular company T-Mobile who had applied for Experian credit checks and may have had their private financial information exposed.

by Patricia Ames

Workflow magazine attended Tigerpaw Software’s 2015 Partner Conference in late October, where we had the opportunity to interview the wonderfully unpretentious CEO, James Foxall. At the event, Tigerpaw announced the launch of its new all-inclusive Software-as-a Service (SaaS) product, Tigerpaw One, a rethinking of the their established Professional Services Automation (PSA) tool. We delved a little deeper and discussed Ouija boards, recurring revenue streams and Foxall’s big gamble. Join me in the SpeakEasy.