Monthly Archives: August 2014

Five Questions to Ask When Evaluating Cloud Storage Solutions

By | Data Security, Facts About the Cloud, How to | No Comments

Directing the use of technology in corporations – large or small – has never been more challenging. Low barriers to entry and a wash of venture capital investment into enterprise computing mean there are more solutions to evaluate for even minor investments. Cloud computing has become one of the most crowded tech solutions spaces in recent years. Cost savings, ease…

Read More

A Data Breach Today Could Cost You Millions

By | Data Security, Enterprise Collaboration | No Comments

The risks of operating a business without secure document storage and collaboration workflows are increasing quickly. With more frequent data breaches occurring due to human error and malicious hackers, businesses small and large have no choice but to take note: It can cost big. Not only is brand reputation at stake, but your hard-earned dollars can quickly fly out the…

Read More

3 Surprising Benefits for CEOs Using Document Collaboration Tools

By | Enterprise Collaboration | No Comments

Modern CEOs are tasked with a diverse range of roles and responsibilities. The need to be in many places at once while managing vast quantities of data from multiple departments means long, high-pressure workdays. Despite the fact that the business world is getting more complex every day, tools have emerged to help manage many of the most time-consuming workflows. Primarily,…

Read More

Facebook Messenger App Adds Risk to Collaboration

By | Corporate Compliance, Data Security, Information Technology | No Comments

Facebook, the social network that boasts more than a billion worldwide users, recently announced that it will require users to have the separate Facebook Messenger app in order to use its instant messaging and voice-calling service. While the Facebook Messenger app has been around since 2011, the recently-released version features enhanced communications and productivity features for on-the-go users, and the…

Read More

Target Shows Shocking Costs of Data Breach

By | Data Security | No Comments

In a recent public disclosure to shareholders, Target has quantified the dollar cost of its heavily-publicized customer data breach in late 2013. Forbes reports the cost at $148 million, bringing a staggering conclusion to the theft of over 40 million credit card numbers. In addition to the larger figure, the company noted that only a small portion is covered by…

Read More

Watch out for Smart Watches in the Workplace

By | Data Security, Enterprise Collaboration, Facts About the Cloud | No Comments

Smart watches are quickly becoming the next big thing in wearable technology. With bold feature sets and promises of health monitoring and management, employers can expect to see them appearing in the workplace more frequently. While new technology is exciting, there are several important ideas executives must keep in mind to stay on top of potential data security risks. More…

Read More

5 New Smartphones Poised to Challenge BYOD Policies

By | Corporate Compliance, Data Security | No Comments

The proliferation of Bring Your Own Device (BYOD) policies means IT managers are now tasked with chasing down a never-ending supply of new devices and operating systems. Anticipating the needs and preferences of users is their best bet in the fight to maintain data security. To make the job easier, we’ve compiled some of the most important upcoming releases. Apple…

Read More
Sound exciting? Try Arc for free now! Get Started