GettyImages-1424122482
June 6 2024
“The auditors are here!” Your blood runs cold, like seeing red and blue flashing lights in the rearview mirror. You needn’t worry. An external audit doesn’t have to incite fear... View More
GettyImages-1555003816
May 1 2024
“We’ve been breached.” These are three words no executive wants to hear from their IT staff. Any mailing or data processing company that deals with sensitive client data likely generates
GettyImages-1420039900
Oct. 4 2023
There is an adage that states all press is good press, but when it comes to data security, nothing could be further from the truth. For organizations that outsource their print and mail commun... View More
GettyImages-486490228
Dec. 16 2022
You might call it a disaster recovery (DR) plan, redundant operations, or business continuity strategy, but your mail center should have something in place that allows you to continue processi... View More
GettyImages-1179590017
June 24 2020
When COVID-19 began to spread beyond the original epicenter in Wuhan, China, calls for social distancing reached a fever pitch. Governments in hard-hit areas imposed stay-at-home orders and sh... View More
GettyImages-1026713552
Dec. 20 2019
The headline in USA Today blared, “2019 on track to be worst year ever for data breaches.” There were more than 3,800 breaches reported in the first half of the year, a 52% increase from... View More
GettyImages-639169060
Jan. 18 2019
Earlier this fall, the news was full of reports regarding disasters impacting thousands of people here in the United States. Hurricanes, tropical storms, and the many fires devouring acres of land in... View More
GettyImages-900256936
Sept. 11 2018
One of my favorite sayings is that an ounce of prevention is worth a pound of cure. That is never more true than when it comes to protecting a company’s data. Even a simple mistake like using the... View More
Jan. 27 2016
January 27, 2016, Toronto, Ontario – In response to a wave of attacks making media headlines by hackers infiltrating sensitive customer information, Crawford Technologies has released a new digital
158909167
April 29 2008
Information security involves detailed attention to both physical and data security, coupled with proof of compliance and robust staff training By David Henkel... View More

Follow