IT needs to find a way to apply centrally-defined security policies without any effort or awareness by users. Automated policy application in a transparent security environment keeps workers happy since it allows them to focus on getting their work done without thinking about security. Automating security policies also removes Big Brother-like obstacles to the collaboration that companies need to remain competitive and ensures policies are consistently applied
I bring this up because Cisco just released the latest installment of its Connected World Technology Report , which found that Millennials don’t really care about computer security and are prone to ignoring IT policies
RIM must provide governance, policy, and rules to determine if information is business records or convenience information. RIM must comply with requirements for external and internal reporting and ensure data is retained and destroyed in a controlled manner, in compliance with company policy
More and more cloud vendors are coming online, so it is impossible to create a policy to block them all. If you have your own cloud space then you only have one cloud to worry about auditing and having policies in place for instead of a sprawling untamable frontier of content that is impossible to police
Less than five hours after I mentioned it in a meeting, an exec from one of the stakeholder groups got a call from security stating that her team was violating policy by using Dropbox
Sounds simple enough, but how can you create a centralised policy that determines precisely, which 30% of the content, needs to be preserved?
2 Comments - no search term matches found in comments.
It includes the processes, roles and policies, standards and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals
It was never realistic to assume that knowledge workers would assist in manually classifying documents according to a complex records retention schedule, and it is equally unrealistic to assume that we will manage the fire hose of data and unstructured ephemeral social content with the same degree of records rigor that we applied to retaining a life insurance policy for the life of the policy holder
1 Comment - no search term matches found in comments.
With the consumerization of IT information might be created and stored in formats never used before so it is important to know how the BYOD policy is meeting their needs and ensuring they are not bypassing security policies by using public cloud sources for collaboration
I was the one who could implement new bizarre network policies (for the good of mankind, naturally), and it was I who held the power to apply patches, and fixes, whenever I deemed it necessary