November 2016

by Patricia Ames

Mike Stramaglio 150Mike Stramaglio is CEO and president of MWA Intelligence, the creators of the FORZA open-architecture ERP platform built on SAP Business One. Mike Stramaglio is a really interesting guy. I’m not kidding. Generous with both his time and money, he is a well-known figure on the speaker circuit as well as on social media, offering up insights and great articles on where technology is headed while also sharing why Frank Sinatra is the greatest singer in the history of the universe. Learn why Mike is the “Charlie Hustle” of business — join me in the SpeakEasy.

1116 CUSA 150by Dennis Amorosano, Canon U.S.A. Inc.

The biggest security threats your business faces are right under your nose: sitting at their desks working, written down in some unopened employee handbook, and next to the water cooler printing out your third-quarter sales numbers. People, policy and insecure machines can lead to dire consequences and might be the three major themes in your Chapter 11 filing.  

1116 IBM 150by Jeb Linton and Jared Klee, IBM

Today, industries as diverse as health care, energy, banking and construction continue to face ever-increasing regulatory burdens. While the industry specifics vary, the themes of increased numbers of regulations, increased regulatory scrutiny, and heightened expectations for compliance are present for most firms across regulated industries. And, with conduct risk an increasing concern for banking, new software-driven devices a focus for health care, and cybersecurity an increasing concern across all industries, regulatory focus is not anticipated to let up.  

1116 Stewart 150by Ken Stewart for Workflow

Identify theft, keyloggers, malware, phishing, ransomware, and state-sponsored hacking — hallmarks of the complex and intricate landscape of information security we inhabit today. If you haven’t been touched by a security breach yourself, it’s a certainty you’ve gasped inwardly as a friend or coworker shared their own story with you. Security concerns have become pervasive and palpable — a dark, alternate reality confirmed by the barrage of breaking headlines. What are you to do in the face of such wantonly malicious intent?  

HIPAA 150by Ali Pabrai, ecfirst, a Konica Minolta HIPAA Consulting Partner

The health care industry has seen more HIPAA settlements in 2016, typically in seven figures, than in any previous year. The industry has also experienced very significant cyberattacks. Cyberattacks are a healthcare epidemic with over 100 million healthcare records already compromised.

1116 Nintex 150by Eric Johnson, Nintex

Rapid growth and advancements in technology have changed both the way we work and the way business operates – more in the last few decades than the last century. If one looks back to the dawn of the computer age, a picture of what machines do for manual processes emerges. In the 1940s, “computers” were actually humans: people who worked slide rules and wrote down results on paper. You could open the local metro daily to the classifieds and see job openings for computers.

WavelengthArt 2If security isn’t top of mind for you or your organization right now, it will be after reading this issue. And while compliance may not equal security, the two certainly go hand in hand; compliance is a reflection of security measures within an organization. We’ve got a top-notch panel of experts this month to answer questions and present us with an excellent reality check on both issues.

1116 Craine 150by Kevin Craine for Workflow

With cybersecurity increasingly in the news, many organizations are taking another look at their own security. When doing so, there are many obvious areas to examine, but it is important to look closely at some commonly overlooked sources of potential security risk as well. Those include information captured in an image archive or document management repository, which can include data like social security numbers, financial and medical records, addresses and phone numbers. These pieces of information can translate into great prospect and profit for cyber-thieves. Is your organization protecting them?