Masonry Blog Full Width

Internal Security Threats

I love movies. I love the drama, the conflict, and the resolution. I love movies that are sappy. I love epic tales and stories that include some form of redemption. I love romance, courage and sacrifice. I love it all…. … Read More

Featured Post

How to Implement Content Based Security Rules

“Should I grant access to this report containing sensitive data?. . .” The employee needs some of the data, but other parts are above their clearance level. What would you do? Restricting access to report content is normal in most … Read More

Featured Post

3 Strategies to Secure Report Content with User Groups

With vast numbers of insiders accessing sensitive report data, you need an easy, consistent, and controlled process for managing permissions. While it’s theoretically possible to manually assign and update access permissions individually for each system, user, document or group, it is obviously costly and … Read More

Featured Post

Leading Change Management

42 years is a long time. The organization I was leading had been using the same basic recipe for success since the 60’s. It had been phenomenally fruitful, and though there had been varying degrees of success in the ensuing years, … Read More

Featured Post

Pursuing Great Customer Service

My son recently celebrated his 21st birthday. He is going to school 7 hours away, but since I remember it being an important milestone for me, my wife and I wanted to make it a particularly special day for him. … Read More

Featured Post

Proper Training Feeds User Adoption

Like most 15 year-old boys I had a death wish. OK, I didn’t really have a death wish, but judging by the risks I regularly took it certainly looked like I did. One particular day three of us decided we were … Read More

Featured Post

5 Ways to Ensure User Adoption

5 Ways to Ensure User Adoption For a number of years, it’s been my counterintuitive contention that folks over the age of 50 are actually MORE flexible than their millennial counterparts. Since the AARP generation has had more experience with … Read More

Featured Post

Replacing Legacy Software

Replacing Legacy Software I own a 1996 Chevy Suburban with 241,000 miles on it. It’s old, quirky, rusty, and the air conditioning doesn’t work. All the knobs on the radio console have broken, and we managed to lose one of … Read More

Featured Post

Music, Art and Content Management

I am a musician.  The son of musicians.  The father of musicians.  I’ve spent my whole life immersed in music and art.  Few things in my life will provoke a visceral reaction more quickly than a moving piece of art.  I … Read More

Featured Post

How to choose the best secure document distribution software

Mail and email simply aren’t the best ways to share documents with others anymore. This is especially true of software-generated documents and documents that your company receives from third parties. Examples of reports you might be distributing include the following: … Read More

Featured Post