The electronic signature market has been around for more than 20 years, but it has seen significant expansion and adoption in the past decade. Highly regulated industries like financial services, insurance, government and health care have led the charge when it has come to implementing this technology because of its ability to enable digital business while keeping processes secure and compliant. Recently, the industry has experienced increased growth in the mid-market as even more small- to medium-sized businesses have started adding e-signatures to their customer-facing processes.
A December 2015 report from Forrester Research, "E-Signatures – A Few Simple Best Practices Drive Adoption" (access requires subscription), attributes this recent increase in adoption to the fact that as customers become more digital, they increasingly expect the companies they do business with to provide high-quality digital experiences. Replacing manual, paper processes with ones that are automated and electronically signed has enabled organizations of all sizes to significantly reduce cycle times, errors and costs while offering the experience customers expect.
As more businesses transition their customer transactions to the web, security is understandably a top concern. When organizations are looking at various e-signature vendors, it is not enough to simply look for an e-signature that is "ESIGN compliant" or has a certain security certification. Taking a broader view of e-signature security will help companies strengthen their legal and compliance position while ensuring maximum adoption. In this slideshow, Silanis, provider of e-SignLive, takes a closer look at the top electronic signature security requirements for digital transactions.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>
IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ... More >>