Masonry Blog Full Width

Improving document distribution: How to track important reports

“I hate her new haircut.” “Why does he talk so much?” “Is that a pimple, mole, or tattoo?” Can you imagine what it would be like if everyone you met could see or hear every thought that crossed your mind? … Read More

Featured Post

33 great ETL tools: Data integration at its best

Extract, transform, load (ETL) becomes data integration In a landscape dominated by data, it can be hard for businesses to keep up. Right now, your business is receiving data from many different platforms. These platforms may include the following: Databases … Read More

Featured Post

When and how to secure personally identifiable information (PII)

Depending on the conversation, you may get very different definitions of what personally identifiable information (PII) is. Generally, people agree that it’s information hackers could use to perform any number of crimes against a person. Most frequently, the specific crimes … Read More

Featured Post

2 methods to safely de-identify protected health information (PHI)

HIPAA doesn’t restrict sharing of de-identified PHI It’s been 20 years since congress enacted the Health Insurance Portability and Accountability Act (HIPAA), and handling protected health information (PHI) is only becoming more complex with advancing technology. The Privacy Rule outlines … Read More

Featured Post

5 steps to create effective, successful knowledge transfer materials

There’s a lot of turnover in the workforce right now Over one-third of the workforce will reach retirement age in under 15 years—when the last baby boomer turns 65. Meanwhile, overall participation in the labor force by 16- to 64-year-olds … Read More

Featured Post

Is manual entry or automatic data extraction more reliable?

All growing companies come to a point when their manual entry processes just can’t keep up. With data increasing at unprecedented rates, security measures are often too difficult to enforce. It’s a very common problem, and recently, we worked with a company who needed to … Read More

Featured Post

5 Things to Consider When Archiving Content

When was the last time you looked at your childhood photo book?  It’s been a few years since I pulled out mine. Even though you rarely look at your childhood photos, do you keep them front and center? Do they … Read More

Featured Post

Data Redaction: What it is, why you need it, and how to start.

It could have been avoided. Have you ever published sensitive customer data on your website? The Medical Council of New South Wales didn’t think they had until Google indexed a report containing Protected Health Information (PHI). Oops. The lack of … Read More

Featured Post

The 5 Steps to Creating a Retention Policy

There’s only one thing worse than not having a required document…having one that you aren’t required to have. Having a retention policy is more important than ever. In the age of cheap storage, there is a tendency to keep far … Read More

Featured Post

Legacy Enterprise Software: Even If It Isn’t Broken – It May Still Need Replacing!

I have a golfing buddy named Bob who loves to operate with the “if it ain’t broke – don’t fix it” philosophy. In fact he follows that adage so tenaciously he even held on to his trusty old clamshell phone … Read More

Featured Post