Monday, April 6, 2020
Home 2019 January

Monthly Archives: January 2019

14 Ways to Create a Secure Password in 2019 (That you’ll Remember)

by - Jack Foster Whether you are an individual or a business handling hundreds of pieces of sensitive data....

MER Announces Keynote for 2019

Nicolas Economou is the chief executive of H5 and was a pioneer in advocating the application of scientific methods to the legal...

Accredited Webinar – Developing Retention Schedules on a Shoestring

Register HERE February 12, 2019 1p-2p EDT Every organization has records, and every organization has...

DSF ’19 Magical Conference Program Now Live – Check it Out!

Our Magicateers (our Advisory Board, Doculabs and BFMA) have been hard at work over the past seven months building a world-class conference that provides invaluable knowledge...

ARMA Southwest Region’s IGP/CRM Workshop announced in Houston, TX

CONFERENCE REGISTRATION IS OPEN Choose your certification and prep for success! Track 1: Becoming a Certified Information Governance Professional (IGP) Track 2: ICRM Exam Prep: Introduction and...

Take a Deep Dive at the MER Conference

MER CONFERENCE 2019 | MAY 20-22 Mike Salvarezza MER Conference VP of Content Development WATCH THE VIDEO EARLY BIRD CONFERENCE: $1,695 ($250 savings)Promo Code EB2019 EARLY BIRD PRE-CONS: $695 Promo Code EBPrecon Early Bird...

Email Attachments: To Click or Not to Click

By David Balaban If a PDF drops into your mailbox, will you click it? What about an image file received from an unknown sender? Is it dangerous to download and open...

Complimentary Educational “IG Academy” Webinar Series – Starts Jan. 22 – Register Today!

IG World & Institute for IG - The Leader in InfoGov Training Resources IG World Magazine & Institute for InfoGov Free “IG Academy” Educational Webinar Series Begins January 22 _____________________________________________________________________________________________ REGISTRATION IS...

7 Cyber Risks to Watch Out For in 2019

by Allen Jame 2018 was an eventful year that brought various security breaches, many of which made headlines. The year proved that even large organizations fall...

Google Removes 85 Adware Apps That Infect 9 Million Android Users

January 8, 2019 Google has removed 85 apps from its Play Store after finding out that they were pushing aggressive, full-screen adware to Android users. With...

Metadata for Archival Collections: Challenges and Opportunities

Metadata is one of the significant costs of digitization. Although archival items can be digitized without cataloging, a digital collection cannot be created and...

Webinar – What Is a Data Steward to Do?

We want to invite you to attend the latest in the monthly DATAVERSITY webinar series, Real-World Data Governance. What Is a Data Steward to Do? will be on...

MER Sapient 2019 Webinar Line-up

MER Sapient continues into 2019 with dozens of webinars, each with comprehensive content that is consistently focused and relevant to the IG professional. Bookmark MER...

Sponsored: Developing Retention Schedules on a Shoestring

Every organization has records, and every organization has legal duties associated with them.  But not every organization has the kind of budget needed to...

First AIIM19 Keynote Announced!

AIIM is proud to announce, Customer Experience Futurist and Author, Blake Morgan as the first keynote confirmed for The AIIM Conference 2019. The customer of the future is already here....

Most LGBTQ are Cyberbullied. Here’s How to Stay Safe Online

by Sarah Turner @ VPN Mentor We at vpnMentor conducted a survey in which we asked 695 LGBTQ+ people worldwide about their experiences online as they relate to...

Bridging the Gap Between Security Awareness and Action – A FREE Infographic from AIIM

https://info.aiim.org/bridging-the-gap-between-security-awareness-and-action-infographic

ICRM issues 2018 Year in Review Newsletter

https://files.icrm.org/2018%20Year%20in%20Review%20Newsletter.pdf  

Image Description Practices for Digital Archives Projects

Formal standards, such as Describing Archives: A Content Standard (DACS), Graphic Materials, and Rules for Archival Description (RAD), have been developed over time for...

What the Marriott Breach Says About Security

DEC 18 We don’t yet know the root cause(s) that forced Marriott this week to disclose a four-year-long breach involving the personal and financial information of 500 million guests...

What is a Hacker?

January 2nd, 2019 - by Andrew Ysasi and guest writer Chris Robert If you are reading this, you may be here to get some validation...

Cyber breaches abound in 2019

Robert Ackerman@BobAckerman / 2 days ago News of high-profile cyber breaches has been uncharacteristically subdued in recent quarters. However, we recently learned that Marriott International/Starwood was the victim of the...