PaperClip Incorporated

The Bridges Blog

Since 1995, Mike has served as President, Vice President of Marketing & Sales, Director of Professional Services,and Consultant for PaperClip Incorporated. In his current role, he is responsible for strategic direction,operations, and corporate communications. Prior to joining PaperClip Software, Mike was the Executive Vice President and co-founder of CMF Design System, a custom software and systems integration firm. Mike received a Bachelor of Science from Rowan University and served as a Captain in the United States Marine Corps.

From the February 2014 issue of Tomorrow's Mortgage Executive

For years PaperClip has been helping the securities and insurance industries go paperless. PaperClip follows the paper filing metaphor of Cabinet, Drawer, Folder, Document, Page and Annotations. Replacing the paper filing system with an electronic mirror version, training and adoption comes quickly. Projects involving elaborate workflow rules are lengthy deployments, hard to follow especially in the financial services industry and simply the wrong place to focus; workflow belongs in the data system, why, because that’s where all the data is. Now Mike Bridges, President of PaperClip, speaks out about how the mortgage industry can adopt straight through processing in a quick and easy way.

Do you have a plan to combat cyber threats? If you don’t, you need one. And any good plan should include assigning responsibility and accountability for system security. What should this cyber security expert do? Here’s some tips:

I'm here to tell you that all good cyber security strategies begin with a plan.

The frequency of online attacks against U.S. business continues to increase, along with the cost of defending against those attacks and
mitigating any resulting data breaches. Cyber-crime now costs a U.S. business $8.9 million per year, an increase of 6% from 2011 and 38% from 2010. Those findings come from the “2012 Cost of Cyber Crime Study,” which was sponsored by security intelligence tool vendor HP and released Monday (10/8/2012) by Ponemom Institute.

As we continue to talk about cyber security plans, we have to talk about The Red Flag Rule, which requires many businesses to develop and implement a formal, written Identity Theft Prevention Program for the purposes of detecting the warning signs, or "red flags", of identity theft throughout their day-to-day operations. Here’s what else you need to know: