File Tips

News, tips, and advice from your information management experts

Endpoint Protection

Endpoint Protection

Your critical business data is distributed across tens, hundreds, thousands of your employees’ desktops, laptops, tablets, and smartphones. Most companies don’t have a comprehensive solution to this complex problem, leaving them vulnerable. Protect your company and workforce from data loss, data breach, and ransomware with proper endpoint protection. What is Endpoint Protection? Endpoint protection is […]
The Truth on Going Paperless

The Truth on Going Paperless

Companies looking for more robust and responsive record-keeping systems should strike a balance between paper and digital, and find a true “sweet spot” with critical company documents in the process.
5 Ransomware Prevention Tips

5 Ransomware Prevention Tips

Ransomware is more prominent, sophisticated, and troublesome than ever. Universities, hospitals, and even government agencies have made headlines as victims of malicious computer viruses. No industry is immune. Review these five ransomware prevention tips can help to protect your data. What is ransomware? Ransomware is a form of malicious software (or malware) and once it’s […]
5 Records Management Laws Every Pro Must Know

5 Records Management Laws Every Pro Must Know

Brush up on these 5 records management laws to understand where we are now, and where we’re headed.
NIST Media Protection Requirements

NIST Media Protection Requirements

The clock is ticking on the latest compliance mandate: NIST Special Publication 800-171. Any organization or contractor that holds or processes controlled unclassified information must ensure that they comply with the new regulation. Failure to comply with this mandate will leave you in breach of contract, and subject to criminal, civil, administrative, and penalties by […]
Latest Security Vulnerability Spectre & Meltdown

Latest Security Vulnerability Spectre & Meltdown

We start the year with a security vulnerability that exposes nearly everyone. Pretty much anything with a chip on it- computers, mobile devices, all software platforms Windows, iOS, Chrome, and Android to thermostats and baby monitors. Passwords, proprietary information, and even encrypted communications can be uncovered. Meltdown and Spectre will continue making 2018 headlines.
5 Things Records Managers Must Do Differently In 2018

5 Things Records Managers Must Do Differently In 2018

This year’s biggest records management trends will broaden and amplify the practice of traditional RIM. To start, we’ll see new laws, tackle more sophisticated records analysis and place even more emphasis on the bottom line.

Corodata Receives Important SOC 1 Type II Attestation

Independent Audit Verifies Corodata’s Internal Controls and Processes FOR IMMEDIATE RELEASE POWAY, CA – January 2018 — Corodata, an Information Management Company, announced that it has completed the rigorous SSAE 18 (SOC 1) Type II Audit. Now more than ever, independent audits like SOC 1 Type II are imperative for protecting confidential information. This attestation […]
Top 10 Jaw-Dropping Records Management Statistics of 2017

Top 10 Jaw-Dropping Records Management Statistics of 2017

We’ve pulled together some of the most important, informative and astonishing records management statistics of 2017, a top 10 that list will have you raising your eyebrows, shaking your head and pledging to do even better in 2018. Here goes!
The Serious Risks of NOT Shredding

The Serious Risks of NOT Shredding

Millions of dollars, and your reputation. Believe it or not, nondigital theft happens more often than you think. We hear a lot about the “paperless” office these days, and enormous online data breaches often dominate the news. Businesses still rely heavily on paper, however, and experts say that old-fashioned paper thieves are quietly making off […]