4 Easy Security Tips to Keep Data Protected
Everyone should take steps to keep their sensitive information safe. In light of World Password Day, here are some easy data protection tips you can follow. The post 4 Easy Security Tips to Keep Data...
View ArticleHaving Trouble Sharing Content Externally Using SharePoint? Intralinks Can Help.
Many companies neglect to address security gaps in how information is shared externally. There is a solution: Intralinks Content Collaboration Network™. The post Having Trouble Sharing Content...
View ArticleWho Says the Security Perimeter is Dead? Content is the New Perimeter.
It's a tough job to build security around an organization's data and information. This is why we suggest building security into the data/information itself. The post Who Says the Security Perimeter is...
View ArticleTrust Needs to be Earned
Protecting confidential information as it is shared with external parties around the world is not easy, and jeopardising it could cost your business everything. As our most sensitive information...
View ArticleTechnologies HR Professionals Should Know to Boost Productivity and Compliance
The Intralinks HR Security Series is a monthly blog series authored by Michal Kimeldorfer, Executive Vice President of Human Resources at Intralinks, created to inform HR professionals about the...
View ArticleMaintaining Costs while Maintaining Data Privacy Compliance
A recent study by Thomson Reuters highlighted that 69 percent of firms (70 percent in 2015) expected regulators to publish even more information in the coming year, with 26 percent expecting...
View ArticleTake Your Own Best Advice: Email Safely
If we in the Legal department were to measure our email practices by the standards we advise for the other departments in our organization, would we pass? Phishing messages continue show up in our...
View ArticleAre Your Investors Requesting a Copy of Your Compliance Manual? Here’s what...
As data security continues to be a focus in the hedge fund space, clearly articulated compliance manuals can be a competitive advantage for firms and result in more allocations. More and more...
View ArticleHow Information Rights Management Helps Prevent File Leakage
Information Rights Management (IRM) permissions and controls work at the single document level. Thus, the files remain secure and in the owner's control. The post How Information Rights Management...
View ArticleCollaboristaBlog Roundup September 5
Your guide to interesting data sharing, security, and privacy news. This week features data security tips, IRM insights and recent hacks in the news. The post CollaboristaBlog Roundup September 5...
View ArticleWhy Content, not Identity, is the NEW Enterprise Perimeter
The enterprise perimeter used to be protected by the firewall — recently, that perimeter has shifted. Find out why content is the NEW enterprise perimeter. The post Why Content, not Identity, is the...
View ArticleThe Secure Way to Travel
Many people are collaborating and working remotely. No matter the location, security is ongoing. Here are tips to help keep information secure on-the-go. The post The Secure Way to Travel appeared...
View ArticleCollaboristaBlog Roundup September 26
Welcome to our guide on interesting data sharing, cybersecurity, and privacy news. This week features information rights management and security insights. The post CollaboristaBlog Roundup September 26...
View ArticleIRM: The Best Defense Against Industrial Espionage
Industrial espionage will never be eradicated, but information rights management (IRM) technology now exists to help mitigate internal and external threats. The post IRM: The Best Defense Against...
View ArticleHow the Traditional Boundaries of Business have Changed
In a digital world, information must flow freely for productivity, and be secure. To meet these needs, enterprises can apply Information Rights Management. The post How the Traditional Boundaries of...
View ArticleCollaboristaBlog Roundup October 3
Welcome to your weekly guide on the most interesting data sharing, security, and privacy news and events. This week features data security research and IRM. The post CollaboristaBlog Roundup October 3...
View ArticleIntralinks IRM by design™: Lifetime Content Control
Information Rights Management (IRM) helps secure the enterprise. Intralinks IRM by design™ protects sensitive information no matter how it's shared. The post Intralinks IRM by design™: Lifetime Content...
View ArticleCommon Mistakes When Sharing Business Information
Here are four common mistakes employees make when sharing information, and best practices organizations can follow to alleviate risks. The post Common Mistakes When Sharing Business Information...
View ArticleCollaboristaBlog Roundup October 31
Welcome to your weekly guide on interesting data sharing, security, and privacy updates. This week features file sharing mistakes and security for lawyers. The post CollaboristaBlog Roundup October 31...
View ArticleThe Growing Burden of Content Control for CIOs, CISOs, and CTOs
Files containing sensitive information tend to last a long, long time. And the volume of content keeps piling up, as a recent Ovum Research report reveals. The post The Growing Burden of Content...
View Article