Accounts Payable Operations – AP Automation Implementation – Change Management

Senior management has agreed the company should implement an Accounts Payable Automation/Workflow system.  The key stakeholders have selected a project team and they are considering the products and providers available.  Excitement is in the air.  Automating the processes will save the Accounts Payable team a great deal of effort, will improve compliance to company business… Read More »

Document Recovery & Protection after a Disaster

We recently covered the importance of having a plan in place to prevent your company’s documents from being compromised in the event of a data breach. Backing up your important files and protecting them with secure access can save you and your company many thousands of dollars in potential damages but there are several other… Read More »

Have a Plan for Shredding Your Documents

Are you thinking of going paperless for environmental reasons or because so many businesses are encouraging it? Perhaps you simply want to reduce the burgeoning amount of paper assets you must store and maintain. Keep in mind that any change to your document destruction/shredding process has a better chance for success if your plan clearly… Read More »

Documenting the Real Costs of Paper Processing

When thinking about the word “document,” what do you first visualize? It’s likely that most people think of a standard sized piece of paper – a printed page containing words – a message, data; a printed record. Slowly but surely however, minds are beginning to shift from considering documents as printed pages to instead, digital… Read More »

Why Is Breach Reporting So Important Now?

Laptops, tablets and smartphones have made it easier than ever to share information. Consequently, it has also become easier for hackers to steal sensitive data such as phone numbers, social security numbers, or email addresses from people and businesses. Each year, millions of personally identifiable information (PII) records are compromised because of data breaches. Victims… Read More »