Posts

GDPR: Six months to compliance and opportunity

GDPR: six months to compliance and opportunity

With six months to go before all companies dealing with European Union citizens’ data have to comply with new EU data protection rules, the focus for many is on compliance, but some believe business should be the top priority. Compliance…

KYC - Do you really Know Your Customer? 5 things to consider to help you sell more

,
Customers are precious and are at the center of every successful business, whether it is B2C (Business-to-Consumer) or B2B (Business-to-Business). There are many strategies, philosophies, and books dedicated to this subject. If in the old days,…
Mobile Field Inspection Webinar

Mobile Field Service & Maintenance Webinar – Close the gap between the remote team and the office by easily capturing daily progress

Performing a routine inspection, field service or maintenance, and checking the progress on the field traditionally involve clipboards and handwritten notes, without real-time access to information from other project areas. Converting manually collected data into digital format later on the process is not only time-consuming but also prone to errors. Any field inspector will tell you that the paperwork handling associated with…
visitor onboarding solution

6 reasons to fall in love with a digital visitor onboarding solution

,
Managing visitors is a critical access control process traditionally handled through paper sign-in sheets or guest books. A real headache to legal, security, and front desk departments. And, of course, to visitors! A digital visitor onboarding…
Auditor ISO 27001:2013

ISMS / Lead Auditor ISO 27001:2013 certification

Ana Alves, Data Protection Specialist at Papersoft, has just received her certification as ISMS / Lead Auditor ISO 27001:2013 by IRCA - International Register of Certificated Auditors. As an IRCA certified ISMS/Lead Auditor, Ana Alves has…
Customer data protection: how to eliminate risks of loss or exposure

Customer data protection: how to eliminate risks of loss or exposure

,
Companies increasingly depend on customer’s information to operate and grow their business. Mobile devices, outsourcing services and cloud solutions brought new and impactful security challenges. We all agree that sensitive data exposure is…