Formpipe uses cookies to improve how the website works for you as a visitor. To change your settings or for more information about cookies, click on 'Settings'.
Formpipe uses cookies to improve how the website works for you as a visitor. Here you can change and see information about what cookies are used. Turn on and off categories and save your choice. To learn more click 'Cookie policy'.
These cookies are essential for the website to operate correctly and cannot be disabled without ruining the usability of the website. We delete these cookies when you leave the website, where possible.
Name | Retention period | Information about the cookie | Disclosure of information to third party |
ASP.NET_SessionId | Used to maintain an anonymised user session by the server. | 1 session | No. |
cookie-consent-settings | Used to determine if the user has accepted the cookie consent, contains consent choises | 30 days | No. |
lidc | To promote data center selection | 1 day | Yes, LinkedIn |
li_mc | Used as a temporary cache to avoid database lookups for a member's consent for use of non-essential cookies and used for having consent information on the client side to enforce consent on the client side | 2 years | Yes, LinkedIn |
BIGipServer~EPWS~EPWSWEB103_HTTP_Pool | Determine pool | 1 session | Yes, EPiServer |
These cookies are used to track our visitors across our website. They can be used to build up a profile of search and/or browsing history for every visitor, or to better understand how the user uses the website so that we can improve it. Identifiable or unique data may be collected. Anonymized data may be shared with third parties.
Name | Information about the cookie | Retention period | Disclosure of information to third party |
_fbp | Used by Facebook | 90 days | Yes, Facebook |
AnalyticsSyncHistory | Used by LinkedIn | 30 days | Yes, LinkedIn |
bcookie | browser identification | 2 years | Yes, LinkedIn |
lang | Language preference | 1 session | Yes, LinkedIn |
li_gc | Used to store guests' consent to the use of cookies for non-essential purposes | 2 Years | Yes, linkedIn |
lms_analytics | Used to identify LinkedIn Members in the Designated Countries for analytics | 30 days | Yes, LinkedIn |
_guid | Used to identify a LinkedIn Member for advertising through Google Ads | 30 days | Yes, LinkedIn |
_ga | Used by Google Analytics to identify a visit. | 2 years | Yes, Google gains access to the information collected by the cookie. |
_gid | Used by Google Analytics to identify a visit. | 24 hours | Yes, Google gains access to the information collected by the cookie. |
_gat_gtag_[Property-ID] | Used by Google Analytics to identify if a visitor (web browser) is new or recurrent. | 1 minute | Yes, Google gains access to the information collected by the cookie. |
These cookies are used by third party to track and collect data to be used in advertisment. They can be used to build up a search and/or browsing history for every visitor. Identifiable or unique data may be collected.
Name | Information about the cookie | Retention period | Disclosure of information to third party |
ajn | Used by adnxs for marketing | 90 days | Yes, adnxs |
uuid2 | Used by adnxs for marketing | 90 days | Yes, adnxs |
IDE | Used by Google doubelclick | 2 years | Yes, doubleclick |
_gcl_au | Google adsense | 30 days | Yes, Google |
msd365mkttr | Dynamics marketing | 2 years | Yes, Microsoft |
NID | Google ads optimization | 6 months | Yes, Google |
__Secure-3PAPISID | Builds a profile of website visitor interests | 2 years | Yes, Google |
__Secure-3PAPISID | Builds a profile of website visitor interests | 2 years | Yes, Google |
__Secure-3PAPISID | Builds a profile of website visitor interests | 1 year | Yes, Google |
UserMatchHistory | Sync LinkedIn Ads ID | 30 days | Yes, LinkedIn |
lms_ads | Used to identify LinkedIn Members off LinkedIn in the Designated Countries for advertising | 30 days | Yes, LinkedIn |
Support
Whether you're looking for some
assistance or further information
regarding your solution, we're here
to help. Yes, take me there!
Sweden
Headquarters, Stockholm
Formpipe Software AB
Sveavägen 168, Stockholm
Box 231 31, 104 35 Stockholm
SE – Sverige
Tel: +46 8 555 290 60
Email
Linköping
Gasverksgränd 2, 582 22 Linköping
Tel: +46 8 500 072 25
Email
Västerås
Metallverksgatan 6, 721 30 Västerås
Örebro
Engelbrektsgatan 6, 702 12 Örebro
Denmark
Lautrupvang 1
2750 Ballerup
Tel: +45 3325 6555
Email
Germany
Formpipe Lasernet GmbH
THE SQUAIRE 12
Am Flughafen
60549 Frankfurt am Main
Email
UK, Cambridge
First Floor, Block A, Harston Mill,
Cambridge – CB22 7GG
Tel: +44 1223 872747
Email
UK, Nottingham
Unit 1, Isaac Newton Centre
Nottingham Science Park
Nottingham – NG7 2RH
Tel: +44 115 924 8475
Email
USA
Formpipe, inc.
1200 US Highway 22 E Suite 2000
Bridgewater, NJ 08807
Tel : +1 908 200 7937
Email
Up until recently, cybersecurity was largely considered a ‘tech problem’. It’s been left for IT teams to deal with, perhaps under the leadership of the CTO or CIO. However, as data breaches become more and more common losing companies both money and reputation, times are changing. Security is slowly becoming recognised as a ‘business problem’. Not only this, but a business priority.
We caught up with Mel Donaldson, Formpipe’s Information Security Manager, to understand why security should be top of mind when making business decisions.
“Information security is all about preventing data or information from being leaked, or falling into the wrong hands and being misused. Data is one of the most important and valuable assets to any organisation, so it makes sense to prioritise its security” she said.
It’s important to protect information so that:
Not to mention, data breaches are time-consuming, expensive, and bad for business. “With strong information security controls, a company reduces their risk of internal and external attacks on IT systems, protects sensitive data, ensures business continuity and provides stakeholders with peace of mind” says Mel.
Anyone dealing with potentially sensitive information, whether that be businesses or individuals, should be making it a priority to keep it safe. Mel provides us with her top 5 reasons why:
1. Most businesses (and individuals) have information that needs protection
Whether you’re a small start-up business, or a multinational corporate powerhouse, you’re handling sensitive information. Customers and employees put their faith in organisations to keep their information safe. This can include financial accounts, social security numbers, medical information, even national security secrets. Research shows that only on average, only 5% of a company’s folders are properly protected. It's clear that needs to be done.
Individuals aren’t immune either. Mel says “If you have any information on your system – passwords, bank account details, social security, retail websites etc, you’re vulnerable”.
2. Threats are everywhere
Information security threats are on a steep incline. In fact, data breaches exposed 22 billion records in 2021, with the US in particular seeing a 10% increase on the number of reported data breaches since 2020. “Threats can include anything from worms and viruses, to information extortion, intellectual property theft and even identity theft” says Mel.
Ransomware is also a growing problem, this is where a cyber-criminal blocks access to information or threatens to release a set of data unless a ransom is paid.
Employing penetration testers can help you mitigate any vulnerabilities before malicious actors can take advantage of them. Investing in incident response plans can also help you be better prepared to manage any arising threats.
However, information security threats aren’t limited to just malicious actors. Many experts believe that the biggest threats are actually employees who don’t follow security policies.
In fact, 95% of cybersecurity breaches are caused by human error. Therefore, ensuring your employees receive regular security awareness training to make them aware of any potential risks and dangers is paramount.
3. Security breaches are expensive!
Security breaches are costly for multiple reasons. There’s the loss of revenue while a system is down, there’s the lost business from customers losing faith and leaving, and there’s the cost of trying to rebuild your reputation and gain new customers. According to the Ponemon Institute’s Report, data breaches costed an average of $3.86 million in 2020.
Not only this but “to prevent another breach, businesses and governments must also pay a specialist to analyze the situation and figure out what happened. New and improved security measures will likely be required and those are expensive too” explains Mel.
So, investing in cybersecurity now, could save organisations a small fortune further down the line.
4. Attacks are becoming more sophisticated
Cyber attacks have matured a lot in recent years, with scams becoming a lot more believable. The technology is improving, which not only means that cyber-criminals are getting better, but that they don’t need to do as much hands-on work to be successful.
Mel comments that “cyber-criminals are also more organised than in the past, forming communities and sharing their knowledge and skills. The groups don’t need to be huge. Even just a few cyber-criminals collaborating can do a lot of damage to multiple networks at once.”
5. Information security builds trust
When a data breach hits, news spreads fast. From media coverage to social media posts, the public (even those who aren’t particularly interested in technology) will know it’s a problem. Customers want organisations to look after their data and prioritise its security. If a company fails them, they’ll take their business elsewhere. Mel says:
“Companies can build trust by thoroughly researching the best security measures, conducting regular assessments and knowing their supply chain. They should also have robust response plans in place in case there is a breach. It’s always best to prepare for the worst.”
Looking to keep your documents safe from potential threats? Formpipe's digital repository, Autoform DM, provides secore storage with lifetime configurablity in a controlled and ISO compliant environment. See more here.