White Paper

Scan And Capture Technology Is Not Immune To Data Breaches

Source: ibml

A Q&A with Joseph Pizzitola, VP of Information Technology and Security for ibml

Headlines about security breaches are commonplace. A company is hacked by someone and exposes sensitive information. Other times an employee accidentally leaves a laptop or thumb drive out in public. Regardless of the circumstance, companies that use scan and capture technology must be aware of how liable they are for data breach issues and must implement security features to protect their data.

Joseph Pizzitola, vice president of information technology and security at Imaging Business Machines, LLC, (ibml) provides insights surrounding security issues related to data that is stored in scan and capture technology.

Why have data leaks become so common?

Pizzitola: More devices are being connected to networks and more in- formation is stored in an electronic form resulting in having to defend a larger attack surface with limited resources. Information security is also very hard to do correctly since you’ve got to be right every time and attackers only have to be right once.

Download the full Q&A below to learn more.

access the White Paper!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of ECM Connection? Subscribe today.

Subscribe to ECM Connection X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to ECM Connection