applied net 2017

Applied Net 2017: Here’s Why You Can’t Miss It!


Events

It’s the world’s ‘largest gathering of insurance professionals’ and it’s been going strong for more than 30 years.   Applied Net is annually hosted by the Applied Client Network and is one of the most anticipated conferences by those in the insurance industry. Applied Net’s website is chock full of information that informs and excites registrants and potential attendees on… Read more »


cybersecurity strategy checklist

The ONLY Checklist You Need for Your Preventative Cybersecurity Strategy


eSignature Security

The previous post in our Cybersecurity strategy series addressed whether to outsource or keep cybersecurity efforts inside your organization, a critical consideration in building an effective cyberdefense strategy.  To refresh your memory: An effective cybersecurity strategy is divided into 7 characteristics, which categorize your strategy’s various entities and functions. These characteristics and independent functions can… Read more »


ESRA Podcast: AssureSign talks Blockchain

On-Demand Podcast: AssureSign President and CEO Talks Blockchain


News & Updates

We’re proud to announce our President and CEO, David Brinkman, recently co-hosted a podcast “Blockchain and You,” where he delves into all things blockchain!  What’s Blockchain?  Blockchain is a key platform of underlying technology that empowers digital assets, including the growingly popular digital currency, Bitcoin. Many of us may be familiar with the currency itself, but lack familiarity with the digital infrastructure supporting it.  David, an executive board member on the Electronic Signature and Records… Read more »


Microsoft Ignite

3 Reasons You Can’t Miss Microsoft Ignite


Events

Microsoft first introduced Microsoft Ignite—MS Ignite—to the tech world in May 2015. Almost one year prior to the event’s groundbreaking in Chicago, IL. Microsoft began marketing the event as its beautiful collision of several other, smaller IT conferences—TechEd, Management Summit, Exchange Conference, SharePoint Conference, and Lync Conference to name a few. Unlike its location trending… Read more »


Outsourcing Cybersecurity Strategy

Thinking of Outsourcing Your Cybersecurity Strategy?… Read this First!


eSignature Security

Last week, we analyzed the value and level of threat among the data your organization processes. The analysis allowed you to determine how susceptible this data and therefore, your business could be to a cyberattack. This crucial exercise completed phase 1 of building a cybersecurity strategy:  Phase 2 begins with building a solid foundation for your cybersecurity strategy that, when finished, will best fit your organizational needs.   A solid foundation rests on determining whether to:  Keep all… Read more »


How Vulnerable Are You to Cyberthreats?


eSignature Security

Every company, regardless of size, industry, or location, needs a cybersecurity game plan. Whether you’re a mom and pop shop or a top shelf fortune 500 enterprise, your organization is vulnerable to the growing number of cyberthreats in the digital space. To combat current cyberthreats, inevitable cyberattacks, and potential data breaches, you MUST have a predefined, systemic approach. This approach should encompass… Read more »


The 6 Most Common Cyberthreats to Know


eSignature Security

In a previous post, we discussed the prominent dangers lurking within the cyber arena. In case you missed it, here’s what you need to know:  WHAT: Data Breaches. TechTarget defines a data breach as “an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally… Read more »


The New Battlefield: Cyberwarfare


eSignature Security

“We believe that data is the phenomenon of our time. It is the world’s new natural resource, it is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true—even inevitable—then cybercrime, by definition, is the greatest threat to every profession, every industry, every company in… Read more »