You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting stuff in the cloud is...
Over the last few weeks some pretty bright minds have been talking / writing about what Information Governance (IG) is and isn’t. Unfortunately, I couldn’t find the restraint to stay out of it. To get some of the background of what’s been going on, read a few posts from these...
Introduction (BYOD | MDM) Remote workers and internal or onsite workers empowered with “ bring your own device ” (BYOD) policies can push the boundaries of IT and the typical IT-driven culture. A lot of IT organizations are playing catch-up around governance and their...
A while back I wrote a couple of posts ( one and two ) about attempting to value information as an asset, carried on the balance sheet. I took a very accounting oriented approach, and I think I’ve made some progress. This post follows, after a fashion, those two previous posts. ...
Every company and government organisation has defined goals, targets and strategies for their success or growth, with established timelines for each proposed deliverable. But along the way, all types of terrible events can take place which may jeopardize these strategies and prevent the...
1 Comment - no search term matches found in comments.
Introduction In the previous installments (January 17 and January 26, 2014), I discussed my difficulties with the current definitions of “Information Governance,” a hierarchical view of Governance and Management, and the nature of the activities at each level. This installment...
If you work for or own a business you are creating content every day. You are also receiving content every day. Within the content there is metadata being generated both by people and by the systems themselves. Purchase Orders, Contracts, RFP’s, receipts, safety documents, leases,...
Today, we celebrate our corporate 30 th anniversary, another milestone in the rich history of our company. Incorporated on September 2 nd , 1983 in Chicago, Illinois to develop the first full-text search program for the PC-platform: ZyINDEX. In those days, ZyINDEX was a very popular...
A while back I mentioned that I was going to try to write a book . Well, I’ve started it at last. Between losing my job and spending time at the cabin I’ve not really been motivated or focused. I’ve been spending my time looking for work, but also enjoying rural life at my...
This is a guest post by Dana Simberkoff, AvePoint Vice President of Risk Management & Compliance. (Note: This is part of our series “Collaborate with Confidence”. Previous posts: Assessing Risk: Is Your Compliance Plan up to the Test? ) Information...