SlideShare a Scribd company logo
1 of 25
EXPECT BETTERSM
Tech Tools
Office Security,
Document Protection,
Paperless Office
EXPECT BETTERSM
The Why
Want to be
paperless?
Don’t know where to
start?
EXPECT BETTERSM
5 Easy Steps
Step 1: Prepare
Step 2: Choose Cloud storage / Document
Management
Step 3: Set-up Processes & Files
Step 4: Scan
Step 5: Reduce costs and be more Green!
EXPECT BETTERSM
Step 1: Prepare
• Prepare to convert paper files
• Get the basic tools
• Scanner
• Cloud storage and
Document Management
• Staple remover
• Laptop
 Gather papers to be digitized
in one place
EXPECT BETTERSM
Step 2: Use the Cloud
EXPECT BETTERSM
Use Case – Box.com
Box is a cloud platform that helps businesses securely store,
share and manage all their company files. With this system,
businesses can organize files using a customizable structure,
set restrictions on which employees have access to which
files, and upload files one at a time or drag and drop
multiple files all at once. Box integrates with Microsoft Office
and Google Apps, and supports more than 200 file types,
including PowerPoint, spreadsheets, PDFs, images, videos
and audio.
To access comparison on Google Drive and Box.com
http://bit.ly/boxvsgoogle
EXPECT BETTERSM
Top Reasons
 Paperless Files Are Easily Saved/Retrieved
on the Go
 Document Organization
 Automatic Backups
 Data Security
 Environmental Friendliness
 Financial Benefits
EXPECT BETTERSM
Issues to Consider
 Security
•User Permissions (giving access to
information)
•Password Policies
•Audit Trails
 Technology
•Single Sign on Support
•Mobile Devices
EXPECT BETTERSM
Security – SAE 16 Compliance
• Access to customer data is restricted to
authorized individuals
• Physical locations where data is kept are
protected
• Sufficient system redundancy exists
• Policies and procedures are in place to
address customer privacy concerns
Measure of the effectiveness of business controls in operation.
Google and Box have both passed SSAE 16 Type II audits and the reports are
available upon request.
EXPECT BETTERSM
User Permissions
With both Google Drive and Box, IT
administrators can:
 Create user groups
 Share specific folders and files on a
per-user group basis and assign full or
read-only access
 Password protection, expiration dates
EXPECT BETTERSM
Storage Options
Storage Options
Network
File Share Box
Type of collaboration Inter-department
External customers
and vendors
File Size Limits No Limit 5gb
Document Storage
File Sharing
Edit document without downloading
Folder-level permissions
File-level permissions
Versioning
Document Feedback/Comments
Categorization/Tagging
Email Alerts
Document Approval
Workflows
Upload via Email
Calendars
Tasks
Synchronize Files with Local PC
Set Expiration on Permissions
Mobile Device Access
EXPECT BETTERSM
Step 3: Set-up
Information &
Files
EXPECT BETTERSM
Folder Structure Hierarchy
EXPECT BETTERSM
Collaboration
EXPECT BETTERSM
Uploading and Sharing
EXPECT BETTERSM
Download on All Devices
EXPECT BETTERSM
EXPECT BETTERSM
Files Resident on Hard Drive
EXPECT BETTERSM
Editing Saves back to the Cloud
EXPECT BETTERSM
Step 4: Scan
EXPECT BETTERSM
Step 4: Scan
 Consider Naming Conventions
• Keep file names short but meaningful
• Use capital letters to delimit words, or
underscores
• Always use two digital numbers 01-99
• Dates back to front, 4 digital year, 2 digit
month 2 digit day
• YYYYMMDD or YYYYMM or YYYY or YYYY-
YYYY.
• File names of recurring events should
include date
EXPECT BETTERSM
File Naming Conventions
EXPECT BETTERSM
"If you can't explain it simply, you don't understand
it well enough." --Albert Einstein
EXPECT BETTERSM
Thank you!

More Related Content

What's hot

Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
Knowledge Tree Overview
Knowledge Tree OverviewKnowledge Tree Overview
Knowledge Tree Overviewpmollins
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...ILYA ROITMAN
 
Storage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationStorage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationHybrid Cloud
 
Storage Made Easy Case Study | Top Tier Media Company, M-Stream® File Transfe...
Storage Made Easy Case Study | Top Tier Media Company, M-Stream® File Transfe...Storage Made Easy Case Study | Top Tier Media Company, M-Stream® File Transfe...
Storage Made Easy Case Study | Top Tier Media Company, M-Stream® File Transfe...Hybrid Cloud
 
Microsoft Office 2013
Microsoft Office 2013Microsoft Office 2013
Microsoft Office 2013Vasco Marques
 

What's hot (10)

Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
Knowledge Tree Overview
Knowledge Tree OverviewKnowledge Tree Overview
Knowledge Tree Overview
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
 
OneDrive for Business 101
OneDrive for Business 101OneDrive for Business 101
OneDrive for Business 101
 
Dropbox
DropboxDropbox
Dropbox
 
Storage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationStorage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer Acceleration
 
DoINeedDAM
DoINeedDAMDoINeedDAM
DoINeedDAM
 
Microsoft
MicrosoftMicrosoft
Microsoft
 
Storage Made Easy Case Study | Top Tier Media Company, M-Stream® File Transfe...
Storage Made Easy Case Study | Top Tier Media Company, M-Stream® File Transfe...Storage Made Easy Case Study | Top Tier Media Company, M-Stream® File Transfe...
Storage Made Easy Case Study | Top Tier Media Company, M-Stream® File Transfe...
 
Microsoft Office 2013
Microsoft Office 2013Microsoft Office 2013
Microsoft Office 2013
 

Similar to Go paperless with 5 easy steps using cloud storage

The Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud PlatformThe Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud PlatformHybrid Cloud
 
Introducing OfficeBox
Introducing OfficeBoxIntroducing OfficeBox
Introducing OfficeBoxJiransoft
 
Level 1: Box Developer Training Program
Level 1: Box Developer Training ProgramLevel 1: Box Developer Training Program
Level 1: Box Developer Training ProgramschwartzMS
 
ShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionMahendra Kulkarni
 
Introducing OfficeBox
Introducing OfficeBoxIntroducing OfficeBox
Introducing OfficeBoxDirectReader
 
Presentation Australia
Presentation AustraliaPresentation Australia
Presentation AustraliaGreg Lennon
 
Clou doc intro_eng_20160524
Clou doc intro_eng_20160524Clou doc intro_eng_20160524
Clou doc intro_eng_20160524sang yoo
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesPT Datacomm Diangraha
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareHybrid Cloud
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)PT Datacomm Diangraha
 
SFSU ISYS 363-8 Fall 2013-group: Team 5
SFSU ISYS 363-8 Fall 2013-group: Team 5SFSU ISYS 363-8 Fall 2013-group: Team 5
SFSU ISYS 363-8 Fall 2013-group: Team 5Marcus_Wong
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Hybrid Cloud
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
SME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for ScalitySME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for ScalityHybrid Cloud
 
Asset Management and Workflow
Asset Management and WorkflowAsset Management and Workflow
Asset Management and WorkflowVirtu Institute
 
Webinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration SystemWebinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration SystemStorage Switzerland
 

Similar to Go paperless with 5 easy steps using cloud storage (20)

The Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud PlatformThe Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud Platform
 
Introducing OfficeBox
Introducing OfficeBoxIntroducing OfficeBox
Introducing OfficeBox
 
Level 1: Box Developer Training Program
Level 1: Box Developer Training ProgramLevel 1: Box Developer Training Program
Level 1: Box Developer Training Program
 
ShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management SolutionShareDocs Enterpriser - Comprehensive Document Management Solution
ShareDocs Enterpriser - Comprehensive Document Management Solution
 
Document management and collaboration system
Document management and collaboration systemDocument management and collaboration system
Document management and collaboration system
 
Introducing OfficeBox
Introducing OfficeBoxIntroducing OfficeBox
Introducing OfficeBox
 
Presentation Australia
Presentation AustraliaPresentation Australia
Presentation Australia
 
Clou doc intro_eng_20160524
Clou doc intro_eng_20160524Clou doc intro_eng_20160524
Clou doc intro_eng_20160524
 
Cloudciti Enterprise File Share Services
Cloudciti Enterprise File Share ServicesCloudciti Enterprise File Share Services
Cloudciti Enterprise File Share Services
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
 
Technology in Law Practice
Technology in Law PracticeTechnology in Law Practice
Technology in Law Practice
 
SFSU ISYS 363-8 Fall 2013-group: Team 5
SFSU ISYS 363-8 Fall 2013-group: Team 5SFSU ISYS 363-8 Fall 2013-group: Team 5
SFSU ISYS 363-8 Fall 2013-group: Team 5
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud docu ppt
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
SME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for ScalitySME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for Scality
 
Asset Management and Workflow
Asset Management and WorkflowAsset Management and Workflow
Asset Management and Workflow
 
Webinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration SystemWebinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration System
 
Document management
Document managementDocument management
Document management
 

More from Better Homes and Gardens Real Estate

Tech Tools - Video Marketing, Virtual Meetings, Streaming Education
Tech Tools - Video Marketing, Virtual Meetings, Streaming EducationTech Tools - Video Marketing, Virtual Meetings, Streaming Education
Tech Tools - Video Marketing, Virtual Meetings, Streaming EducationBetter Homes and Gardens Real Estate
 

More from Better Homes and Gardens Real Estate (20)

Follow the money - the new movement of capital
Follow the money - the new movement of capitalFollow the money - the new movement of capital
Follow the money - the new movement of capital
 
Real Estate Lead Management
Real Estate Lead ManagementReal Estate Lead Management
Real Estate Lead Management
 
Social Media and Florida Real Estate Law and the Code of Ethics
Social Media and Florida Real  Estate Law and the Code of EthicsSocial Media and Florida Real  Estate Law and the Code of Ethics
Social Media and Florida Real Estate Law and the Code of Ethics
 
The power of learning - for the real estate industry
The power of learning - for the real estate industryThe power of learning - for the real estate industry
The power of learning - for the real estate industry
 
Follow the Money - The Next Wave of International Buyers
Follow the Money  - The Next Wave of International BuyersFollow the Money  - The Next Wave of International Buyers
Follow the Money - The Next Wave of International Buyers
 
More than a score - Using Ratings and Reviews in Real Estate
More than a score - Using Ratings and Reviews in Real EstateMore than a score - Using Ratings and Reviews in Real Estate
More than a score - Using Ratings and Reviews in Real Estate
 
Tech Tools - Video Marketing, Virtual Meetings, Streaming Education
Tech Tools - Video Marketing, Virtual Meetings, Streaming EducationTech Tools - Video Marketing, Virtual Meetings, Streaming Education
Tech Tools - Video Marketing, Virtual Meetings, Streaming Education
 
Learning trends
Learning trendsLearning trends
Learning trends
 
Follow the-money - The New Luxury and Resort Buyer
Follow the-money - The New Luxury and Resort BuyerFollow the-money - The New Luxury and Resort Buyer
Follow the-money - The New Luxury and Resort Buyer
 
Increase you online presence 2014
Increase you online presence 2014Increase you online presence 2014
Increase you online presence 2014
 
Florida Realtors Lead Conversion
Florida Realtors Lead ConversionFlorida Realtors Lead Conversion
Florida Realtors Lead Conversion
 
Big data Presentation from REALTOR Party Convention
Big data Presentation from REALTOR Party ConventionBig data Presentation from REALTOR Party Convention
Big data Presentation from REALTOR Party Convention
 
January Kick off - Negotiation Series
January Kick off - Negotiation SeriesJanuary Kick off - Negotiation Series
January Kick off - Negotiation Series
 
Tech Tools in the Classroom Means Engagements
Tech Tools in the Classroom Means EngagementsTech Tools in the Classroom Means Engagements
Tech Tools in the Classroom Means Engagements
 
Cloud slides 2013
Cloud slides 2013Cloud slides 2013
Cloud slides 2013
 
45 apps to boost your real estate business
45 apps to boost your real estate business45 apps to boost your real estate business
45 apps to boost your real estate business
 
Social media footprint
Social media footprintSocial media footprint
Social media footprint
 
How to do an effective seller presentation on a tablet
How to do an effective seller presentation on a tabletHow to do an effective seller presentation on a tablet
How to do an effective seller presentation on a tablet
 
Tablet apps for real estate
Tablet apps for real estateTablet apps for real estate
Tablet apps for real estate
 
Where it all comes together
Where it all comes togetherWhere it all comes together
Where it all comes together
 

Recently uploaded

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Recently uploaded (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

Go paperless with 5 easy steps using cloud storage

  • 1. EXPECT BETTERSM Tech Tools Office Security, Document Protection, Paperless Office
  • 3. Want to be paperless? Don’t know where to start?
  • 4. EXPECT BETTERSM 5 Easy Steps Step 1: Prepare Step 2: Choose Cloud storage / Document Management Step 3: Set-up Processes & Files Step 4: Scan Step 5: Reduce costs and be more Green!
  • 5. EXPECT BETTERSM Step 1: Prepare • Prepare to convert paper files • Get the basic tools • Scanner • Cloud storage and Document Management • Staple remover • Laptop  Gather papers to be digitized in one place
  • 6. EXPECT BETTERSM Step 2: Use the Cloud
  • 7. EXPECT BETTERSM Use Case – Box.com Box is a cloud platform that helps businesses securely store, share and manage all their company files. With this system, businesses can organize files using a customizable structure, set restrictions on which employees have access to which files, and upload files one at a time or drag and drop multiple files all at once. Box integrates with Microsoft Office and Google Apps, and supports more than 200 file types, including PowerPoint, spreadsheets, PDFs, images, videos and audio. To access comparison on Google Drive and Box.com http://bit.ly/boxvsgoogle
  • 8. EXPECT BETTERSM Top Reasons  Paperless Files Are Easily Saved/Retrieved on the Go  Document Organization  Automatic Backups  Data Security  Environmental Friendliness  Financial Benefits
  • 9. EXPECT BETTERSM Issues to Consider  Security •User Permissions (giving access to information) •Password Policies •Audit Trails  Technology •Single Sign on Support •Mobile Devices
  • 10. EXPECT BETTERSM Security – SAE 16 Compliance • Access to customer data is restricted to authorized individuals • Physical locations where data is kept are protected • Sufficient system redundancy exists • Policies and procedures are in place to address customer privacy concerns Measure of the effectiveness of business controls in operation. Google and Box have both passed SSAE 16 Type II audits and the reports are available upon request.
  • 11. EXPECT BETTERSM User Permissions With both Google Drive and Box, IT administrators can:  Create user groups  Share specific folders and files on a per-user group basis and assign full or read-only access  Password protection, expiration dates
  • 12. EXPECT BETTERSM Storage Options Storage Options Network File Share Box Type of collaboration Inter-department External customers and vendors File Size Limits No Limit 5gb Document Storage File Sharing Edit document without downloading Folder-level permissions File-level permissions Versioning Document Feedback/Comments Categorization/Tagging Email Alerts Document Approval Workflows Upload via Email Calendars Tasks Synchronize Files with Local PC Set Expiration on Permissions Mobile Device Access
  • 13. EXPECT BETTERSM Step 3: Set-up Information & Files
  • 20. EXPECT BETTERSM Editing Saves back to the Cloud
  • 22. EXPECT BETTERSM Step 4: Scan  Consider Naming Conventions • Keep file names short but meaningful • Use capital letters to delimit words, or underscores • Always use two digital numbers 01-99 • Dates back to front, 4 digital year, 2 digit month 2 digit day • YYYYMMDD or YYYYMM or YYYY or YYYY- YYYY. • File names of recurring events should include date
  • 24. EXPECT BETTERSM "If you can't explain it simply, you don't understand it well enough." --Albert Einstein

Editor's Notes

  1. I sometimes call this session One Piece of Paper At A Time Go over housekeeping items
  2. EACH BULLET ANIMATED – come in one at a time on click Share shannon’s story – The only time she had to meet with her agent is when she put the lockbox and sign in the yard. TIP: One way to diagnose where you are with becoming a mobile agent is ask yourself each time you are meeting with someone, could the meeting/contact be done electronically? Could you get it what you need without having to be face-to-face? When are you reaching out to your client to communicate? When do you have a piece of paper in your hand? Think then = what can you do with it versus the “OLD” way of doing it.
  3. EACH BULLET ANIMATED – come in one at a time on click *Remember – paper less – NOT paper free Share shannon’s story – The only time she had to meet with her agent is when she put the lockbox and sign in the yard. TIP: One way to diagnose where you are with becoming a mobile agent is ask yourself each time you are meeting with someone, could the meeting/contact be done electronically? Could you get it what you need without having to be face-to-face? When are you reaching out to your client to communicate? When do you have a piece of paper in your hand? Think then = what can you do with it versus the “OLD” way of doing it.
  4. Use story of converting from paper to electronic. REMINDER: Process, not an event – thus one piece of paper at a time (marathon, not sprint)
  5. Move to the cloud to the file you already created You can set up your scanner to email the file or place directly in the cloud. Do that set up first Of course you can always drag and drop -
  6. Recommendations:     Create distinct, higher-level folders to organize sensitive vs. non-sensitive data. When access is granted to a user at a folder level, that user will have the same access rights for all the subfolders below that folder. In other Realogy Information Security   7/22/2014                                                                               Page 2 of 2 words, if you have sensitive files you don’t want to share, but those files fall under a higher level folder where you granted a user access, your sensitive data will now be exposed to the user even though you have not explicitly shared those sensitive files.   Invite other users to lower level folders, which means access to fewer files and less chance of others seeing files you did not intend for them to see. A safe way to manage you sensitive files would be to avoid inviting anyone to your higher-level folder.     The best way to share a single file with another person is to use the “share this file” function. Remember  - Any Box user that has access to a folder will by default have access to  all  files within that folder and  all  its subfolders.
  7. Store PII and other Restricted Confidential Information in Box “Restricted folders”. You have two methods: Use the “Department Restricted“ folder. This folder is managed by your Department Co-Owners and you manage the access to files. Department restricted folders are similar to department network file shares. Use the “Personal Restricted” folder where you manage who has access to both your folders and files. A personal restricted folder is similar to a user’s home drive. All personal restricted folders and associated files are deleted after a user’s separation from the company.   Invite other users to lower level folders, which means access to fewer files and less chance of others seeing files you did not intend for them to see. A safe way to manage you sensitive files would be to avoid inviting anyone to your higher-level folder.     The best way to share a single file with another person is to use the “share this file” function. Remember  - Any Box user that has access to a folder will by default have access to  all  files within that folder and  all  its subfolders.
  8. Specific to Google Drive: Users can be granted the permission to comment on a document, a halfway between read-only and full access With Box, IT administrators can: Put password protection on files and folders Put expiration dates on files and folders Realogy Information Security   7/22/2014                                                                               Page 2 of 2 words, if you have sensitive files you don’t want to share, but those files fall under a higher level folder where you granted a user access, your sensitive data will now be exposed to the user even though you have not explicitly shared those sensitive files.   Invite other users to lower level folders, which means access to fewer files and less chance of others seeing files you did not intend for them to see. A safe way to manage you sensitive files would be to avoid inviting anyone to your higher-level folder.     The best way to share a single file with another person is to use the “share this file” function. Remember  - Any Box user that has access to a folder will by default have access to  all  files within that folder and  all  its subfolders.
  9. Choose your scanner carefully – if you plan on eventually having all your files digitized, be sure you pick a scanner that is up to the task Make sure it scans to PDF You can set up your scanner to email the file or place directly in the cloud. Do that set up first Take Aways
The important take-away points from this article are: The file-naming convention that your business uses needs to be understood by everyone in the organization.
2. File-naming conventions should help people find information quickly by scanning names or by looking for dates or other signifiers in the name.
3. Files that are "naturally-ordered" are easier to scan and sort. 
4. Be consistent with naming conventions.
5. Avoid a huge overhaul project by simply archiving older data by year. File Names As with folders, file names must be: • unique • indicative of what the file contains • in line with how your business thinks about information • scannable (with the human eye) according to how you and your employees find information • naturally ordered alphabetically • consistent!
  10. Permissions (giving access to information): It is important that you understand how permissions work before using Box. This will ensure that only those individuals you want to access your files have appropriate access. Box user permission levels follow a “waterfall” design, in which end users have access only to the folders they were invited to and all sub-folders beneath it. This “trickle down” of permissions means at whatever level the users are invited into a folder tree, their access level flows downward into all the folders and files below. See the Box user guide for details on permissions.
  11. Permissions (giving access to information): It is important that you understand how permissions work before using Box. This will ensure that only those individuals you want to access your files have appropriate access. Box user permission levels follow a “waterfall” design, in which end users have access only to the folders they were invited to and all sub-folders beneath it. This “trickle down” of permissions means at whatever level the users are invited into a folder tree, their access level flows downward into all the folders and files below. See the Box user guide for details on permissions.
  12. Choose your scanner carefully – if you plan on eventually having all your files digitized, be sure you pick a scanner that is up to the task Make sure it scans to PDF You can set up your scanner to email the file or place directly in the cloud. Do that set up first Take Aways
The important take-away points from this article are: The file-naming convention that your business uses needs to be understood by everyone in the organization.
2. File-naming conventions should help people find information quickly by scanning names or by looking for dates or other signifiers in the name.
3. Files that are "naturally-ordered" are easier to scan and sort. 
4. Be consistent with naming conventions.
5. Avoid a huge overhaul project by simply archiving older data by year. File Names As with folders, file names must be: • unique • indicative of what the file contains • in line with how your business thinks about information • scannable (with the human eye) according to how you and your employees find information • naturally ordered alphabetically • consistent!
  13. Choose your scanner carefully – if you plan on eventually having all your files digitized, be sure you pick a scanner that is up to the task Make sure it scans to PDF You can set up your scanner to email the file or place directly in the cloud. Do that set up first Take Aways
The important take-away points from this article are: The file-naming convention that your business uses needs to be understood by everyone in the organization.
2. File-naming conventions should help people find information quickly by scanning names or by looking for dates or other signifiers in the name.
3. Files that are "naturally-ordered" are easier to scan and sort. 
4. Be consistent with naming conventions.
5. Avoid a huge overhaul project by simply archiving older data by year. File Names As with folders, file names must be: • unique • indicative of what the file contains • in line with how your business thinks about information • scannable (with the human eye) according to how you and your employees find information • naturally ordered alphabetically • consistent!