by Zasio | Nov 14, 2016 | Blog
When you purchase software, you’re probably already making a big investment. You might think one way to cut down on cost is to skip the product protection or support plan. Dodging these add-ons might not be a big deal for software that has limited reach in your...
by Zasio | Oct 31, 2016 | Blog
Data breaches are an everyday occurrence that demonstrate no enterprise or individual is impervious to vulnerabilities. In 2015, there were 781 known data breaches in the U.S., the second highest year since the Identity Theft Resource Center began tracking them in...
by Zasio | Oct 10, 2016 | Blog
MasterCard recently announced that it is going live with biometric payment authentication in certain European markets with a worldwide launch expected in 2017. In brief summary, mobile payments are authenticated through either facial or fingerprint biometric...
by Zasio | Oct 5, 2016 | Blog, By Rick Surber
All enterprises, whether they be commercial, governmental, charitable, or any other structure, are required to follow information management regulations in some way; there are even laws regulating the president of the United States.[1] This article discusses several...
by Zasio | Sep 22, 2016 | Blog
As more companies invest in efforts to reduce their paper footprint, we recommend taking into consideration a few key guidelines when moving forward with data conversion initiatives to scan or image paper records. Initially, a determination must be made on whether the...
by Zasio | Aug 23, 2016 | Blog, By Rick Surber
ROT stands for Redundant, Obsolete, and/or Trivial information and includes all information NOT being stored for a valid business, legal or common practice purpose. It is duplicative of official records, past its useful life, and/or information that does not meet the...