I was first introduced to information lifecycle management about 15 years ago when I was a sales rep for an SAP consulting company. Because SAP generates huge volumes of data that eventually clogs up the system, we helped companies archive the old data into offline document management systems for easy location and retrieval if/when needed. As I learned more about document management systems, I expanded my focus from selling just archiving solutions to selling complete content management solutions that would control the lifecycle of corporate documents –from creation, through revisions, approvals, archiving and eventual destruction.
Archive for the ‘Information Spillage’ Category
We’ve all been there; heart racing, palms sweating, and gasps of remorse while frantically pressing the email recall button and praying you haven’t done what you think you have just done. You guessed it, I’m talking about the “oops” email – the email that you should not have just sent. The email that could cost you your job, your reputation and a sizable amount of regret!
Suggesting that IT is responsible for protecting today’s data is like suggesting a car dealership is responsible for the safety of drivers. Ultimately, you can buy a car from a dealership, but it’s your responsibility to be safe and avoid accidents. IT alone can’t cover the “oops” email or any other user blunders. As we move forward in a world where users are responsible for creating and handling an organization’s most important asset – data – it’s imperative to make users aware of their responsibility. After all, users are often much more aware of the sensitivity of a file than a machine can be.
I hear you asking: “Why is it my responsibility when we have all these great security systems?”
Each year, International Privacy Day reminds us how important it is to question where sensitive data resides, who has access to it, and how to best value and protect private information. As large enterprises hire the next generation of social media savvy employees, it is also a good time to question whether these millennials understand the value of data. Do they know what information should stay private vs. what can be shared?
Working with a generation that readily connects, collaborates and shares information online, companies are faced with educating employees on balancing the need to share with the need to protect. In an era of digital business, company brand and customer loyalty and retention depend on it.
This will be the rarest of posts. I am going to begin my post about why Data Classification is important to a content and context aware security program by telling you all of the reasons why I was originally skeptical of its value. I do so in hopes that people who share the same concerns I did will have an opportunity to experience the magic of the Titus approach vicariously through me. I am also going to do something that few people who are in my position are willing to do, while simultaneously do something no author should ever do. I am going to admit I was wrong and I am going to quote myself.
“I was wrong” – Me
With so many metrics focused on the “cost of a data breach” as well as how much money is spent on data security, is it crazy to think that boards of directors will begin asking for financial statements around data value in the next couple of years?
The concept of placing value on your data is not new – analysts have been talking about infonomics and information valuation for a while now. In fact, it just appeared on a recent Gartner hype cycle which suggested infonomics will take 5 to 10 years to plateau. However, with the pressure on organizations to build a strong culture around data security, I would argue we are going to see the need for data value statements within the next 2-3 years.
The value of intellectual property was $329 billion worldwide in 2013, accounting for 1.5% of the $22.2 trillion of the financial flows tracked by the World Trade Organization. In the United States, the $128 billion in intellectual property (royalty and licensing income) generated by US companies accounted for 5.6% of the $2.28 trillion in US exports, making intellectual property revenues second only to food and agriculture exports1. Moreover, given that organizations worldwide lose five percent of their revenue to fraud2, much of it attributable to the theft of intellectual property, protection of this content must be a top priority for any organization.
Mobile devices make it easy to access information from almost anywhere and to share it with just about everyone on earth. However, by their nature as small and highly portable, mobile devices are also more easily lost or stolen—and with them—the data they contain. For businesses, governments, militaries and other organizations that create and deal with sensitive information, mobile devices pose a huge security risk. While there are many solutions designed to protect data on mobile devices, what if you could delete sensitive data from the device before it is put at risk?
It’s Data Privacy Day today, and TITUS is participating with other organizations around the world to raise awareness about the need to protect personal data. While much of the focus of Data Privacy Day is on how individuals can protect their data from the mischievous, the opportunist and the criminal, here at TITUS we like to look at it from the other side. How can the bank, the clinic, the department store, the utility, the educational institution, and all of the other legitimate organizations that collect personal details be good stewards of this information?