Square9 Webinar

Managing the information contained within your company’s documents can be difficult, but certainly doesn’t have to be. JD Young Business Technologies is pleased to be able to offer Square 9’s robust suite of document management software tools. To assist you in utilizing Square 9’s document management applications, feel free to consult the following in-depth webinar.

To Back-scan or Not to Back-scan: That is the Question


For any company going through a document management overhaul that involves moving to a predominantly electronic content management system, there is one looming question—do we back-scan all of our past documents? What is back-scanning? Back-scanning is the process of digitizing all physical paper documents by going “back” and “scanning” every essential material in a company’s…Read Full Article

4 Signs Your Document Management is Inefficient

messy desk

Despite the immense gains in document management technology, there are many companies whose office management processes regarding documents are a mess. Some of these offices may not even realize how disorganized their document management processes have become. In this post, we’re going to look at a few tell-tale signs that your office’s document management protocols…Read Full Article

Why You Should Consider Workflow Management

river raft guide

(3-min read) Everyone knows that, like a well-oiled machine, your business operations perform at their best when all of the moving parts (operations) are neat and efficiently running. A managed structure of processes helps to keep a company afloat and headed in the right direction for years to come. Even as this as a given,…Read Full Article

Remotely Safe: How to Keep Business Network Access Secure with Remote Workers

digital eavesdropping

(4-min read) You’ll be hard-pressed to find a company that doesn’t allow any remote access to sensitive networks for workers when away from the office. Though convenient, this access presents a challenge for data security. How can you keep sensitive company data secure while allowing remote workers access to it while they use a variety…Read Full Article

Unnecessary: Collecting & Storing Too Much Personal Customer Data

hot potato

(4-min read) Common business knowledge says that the more you know about your customers, the better you can serve them. While this may be true from a service and marketing angle, when it comes to cybersecurity threats, what you choose to gather may come back to bite you in the event of a data breach….Read Full Article

The Importance of Securing Physical Data Storage Equipment

locked thumb drive

(3.5-min read) Even Before Cybersecurity, Lock Down Your Physical Security With a particular focus on cybersecurity for business data systems can come a lapse in physical security. Whether a physical drive is left in public, internal doors to storage facilities left unlocked, or filing cabinets are left unsecured when not in use, physical data leaks…Read Full Article