The speed at which information is created is astounding. Companies are unable to analyze this information as quickly as it’s created, and extracting value at a quick pace can be almost impossible. That means the potential value of the information is in many ways greater than the current actual value.
Information is one of their company’s greatest assets but executives do not truly understand, measure or leverage the total value of that information. In fact, they typically do not establish value for information assets the way they do for others assets within the company.
2015 will be the year of value. Companies will keep an internal balance sheet for the valuation of corporation information assets. Otherwise, they will maintain the idea that customer information is only valuable once it’s used and that idle data is valueless. Infonomics, coined by Doug Laney of Gartner Group as the theory and practice that information is an actual asset with both potential and realized value that can be quantified, maximized, and managed as an asset, will become more viable as it begins to be adopted more quickly.
You can read the rest in the article, “2015 Information Governance Trends” by Bassam Zarkout on KMWorld.
Principal Analyst at Bloor Research, Fran Howarth said: “Effective information governance is essential for data security and needs to be implemented across the entire lifecycle of information. Data classification policies and tools allow all data to be classified according to its sensitivity and criticality to the organization. Such policies and tools need to be extended to all systems and devices, including mobile devices, the use of which is growing rapidly.”
Fran Howarth added: “Although malicious data breaches may be of greater concern to respondents, organizations should be aware that insider threats – whether malicious or accidental – can be the most damaging since those internal to the organization have access to the most sensitive information, particularly when they have high levels of privileged access.”
You can read more in the article, “Data Security Ranks In Top 3 In Security Concerns.”
Enterprises have to address content mobility in their enterprise content management strategies to properly manage this content. MCM offerings have to do more than just two-factor authentication as enterprise security needs become deeper. Overall strategies must look at and address the content, apps and devices, with attention tocontent version control, user access privileges, locking content and collaboration around the content.
So, while users can sign up for cloud storage services, IT should also ensure that content can be federated: stored in a secure, managed repository for security, compliance, long-term asset tracking and records management.
You can read the rest on Document Media in Your Content Is On The Move: Is It Secure?
the sheer volume of content, the frequency of creation and the number of formats makes the application and execution of these traditional policies and processes difficult, hence the need to transform records management for information governance. Don’t get me wrong I’m not saying the records management policies or processes need to change, but more how we apply them to our content and ensure they are built-in to day to day processes without burdening the large proportion of staff who now have responsibility for records management without the records management training.
You can read more on the HP blog in “Information Governance: Transforming records management for information governance“
Technology offers business users with “spell checking” in most authoring systems, and we expect that communications sent for business purposes will not have spelling mistakes. Compliance technology needs to bring this power and simplicity to the world of data protection and classification, with user-assisted tagging and automated classification. By repurposing these compliance systems to not only discover “dark data” for compliance purposes, but also for knowledge management and data discovery purposes, organizations will find they are effectively:
- Lowering overall total cost of ownership
- Enabling business self-service
- Accelerating data access and collaboration capabilities
- Adhering to compliance policies and mitigating data risks
For effective data management and collaboration to turn into a competitive advantage for the business, timely access to data as well as multi-directional communication flow — with the right risk management filters in place — is essential. This way, data is available whenever and wherever to those who need it, and unavailable to those who shouldn’t have access.
You can read more on CMS Wire in Dark Data As A Company Asset
Companies that use DAM systems to manage digital content recoup nearly $200,000 over a period of five years. Conversely, those that don’t are losing an average of $44,000 per year.
You can read the rest on Fierce Content Management in Infographic: Digital Asset Management Save Companies Thousands Every Year