Search

1 to 10 of 19
Sort by

Blog Entry
Your personal cloud meets the enterprise

In organisations around the world employees are accidently merging their personal and professional cloud applications with dire results. Some of the issues include the routing of sensitive text messages to family members and the replication of confidential documents onto the servers of...

Robert Hillard's profile image

Blog Entry
SharePoint 2013 BYOD Best Practices

Introduction (BYOD | MDM) Remote workers and internal or onsite workers empowered with “ bring your own device ” (BYOD) policies can push the boundaries of IT and the typical IT-driven culture. A lot of IT organizations are playing catch-up around governance and their information...

Errin O'Connor's profile image

Blog Entry
Information Without Governance Is Like A Kid With Free Reign To The Cookie Jar

Everyone wants information, but no one wants records. The problem with records is that they are inactive, locked in a cabinet and no longer serve a business purpose. Information is active and can go places where records cannot go, such as the cloud and to mobile. Records are tightly managed...

Jeff Lewis's profile image

Blog Entry
Search makes Records Managers Obsolete

It’s been said that IT Doesn’t Matter. The same has been said about Records Managers and the systems that Records Managers maintain. Some of the thinking thrown around is that people can store whatever they want and they can find it whenever they need to with search. This has...

Jeff Shuey's profile image

Blog Entry
Digital Signatures at the Edge

Digital Signatures at the Edge …the “network edge,” that is. In other words, what is the best way to digitally sign documents from mobile devices, tablets, and web browsers? The original technical idea for digital signatures envisioned each signer having their own personal...

Larry Kluger's profile image

Blog Entry
Balancing user productivity & enterprise control

These are facts and they are little shocking: · 45% of the content people need to do their jobs is pulled out of your systems of record and worked on independently – outside your security controls. · 37% of U.S. IT workers are using technology they master first...

Jeffrey Piper's profile image

Blog Entry
Why All RIM Professionals Should Obtain The CIP

I am big advocate of the Information Governance Reference Model . In the IGRM it outlines four key players and they are RIM, legal, IT and business. As I have been studying the IGRM it has recently dawned on me that a Certified Information Professional is crucial for implementation. One of...

Jeff Lewis's profile image

Blog Entry
Infosec13 โ€“ What do you mean by Data Classification!?

It’s fair to say that within business it’s easy to assume that your customer knows everything. I think the customer may even go as far to say that they know everything too. However, one thing that was clear to me whilst at this year’s #infosec13 was a lack of understanding of...

Wesley Budd's profile image

Blog Entry
So Evidently this Mobility is a Thing these Days

So Evidently this Mobility is a Thing these Days I won’t belabor the obvious but just give an example. Today is Wednesday. Monday’s NYT had an piece on this issue and its security implications: Where Apps Meet Work, Secret Data Is at Risk. It quotes a 42-year-old executive Ms....

Richard Medina's profile image

Blog Entry
Managing Information: Make Your Own Luck

When it comes to effectively managing information, sitting back and hoping for it to happen, well, won’t. In this AIIM 2013 Keynote Q&A, a look at how Silicon Valley has gone to war against the enterprise, how peace could break out, and thoughts on BYOD and organizational effectiveness...

Bryant Duhon's profile image