The #cybersecurity threat of #email requires the emergence of #dmarc

E-mail lacks authentication and this is taken advantage of by hackers because 80% of all emails are malware, phish and spam.  DMARC (Doman-based Message Authentication, Reporting and Compliance) is a new authentication standard that is emerging and supported by Google, Yahoo, AOL and Microsoft.

It’s the keystone global standard, integrating two older authentication standards and aligning them in a way that makes it possible to authenticate the identity of an email sender easily, reliably and quickly — essentially creating a white list of acceptable senders of email, and blocking unauthorized senders from delivery.

For more information you can read Deleting Email’s Original Sin: An Historical Perspective

#Blockchain has potential to serve as guardian of our digital identities

Think about how fragmented your digital identity has become. Every time you enter a password or PIN, wherever you are, you’re leveraging some element of your digital identity. Every time you pay with a credit card or recite your Social Security number. Every time you digitally sign a contract.

That holistic digital identity is tied to your physical likeness, finances, conversations, property, and credibility, making it an exceedingly valuable asset. Unfortunately, with pieces of our digital identities being handed out to everyone from retailers to government agencies to employers, those identities are more vulnerable than ever…

Enter blockchain. Any organization can deploy blockchain — a promising, relatively new technology and methodology — to build trust among users. In its purest form, blockchain lets companies instantly make, approve, and verify many types of transactions by leveraging a collaborative digital ledger and a predetermined network of individual contributors or keepers of the blockchain. Once transactions or other data are inside the secure blockchain ledger, cryptography takes over and verification hurdles drastically decrease the chances of data being stolen.

Excerpted from the article, “Blockchain & the Battle to Secure Digital Identities”

Cybersecurity Is More Than An IT Issue

If the end game is preventing something bad from happening, companies typically waste time and money on futile attempts to build an impenetrable wall of systems. Even if it were possible to build a wall that’s 100% secure, it wouldn’t begin to protect the rapidly growing amount of sensitive data that flows outside the firewall through devices and systems beyond the company’s direct control.

It’s far more important to focus on two things: identifying and protecting the company’s strategically important cyber assets and figuring out in advance how to mitigate damage when attacks occur.

The above is from the article “Good Cybsersecurity Doesn’t Try To Prevent Every Attack


Why Situational Intelligence Trumps Data Silos Every Time

Silos are one of the primary reasons organizations are not deriving value from data. The effort for business users to obtain one set of data in a usable format and then manually correlate it with other data in other formats is extreme…

With necessity being the mother of invention, the necessity of breaking down data silos and facilitating real-time or near-real-time decision-making across an organization has given rise to a new category of software called situational intelligence. Situational intelligence combines business intelligence techniques with operational and location intelligence to give businesses a 360-degree operational view. Key to the success of situational intelligence implementations is the application of advanced analytics to large volumes of disparate data and the rich visualization of that data in a single dashboard.

The above quote is from an interview Paul Hofmann did with the Enterprisers Project.  He goes on to say in the second part of the interview:

Situational intelligence approaches the problem as follows: Data is analyzed as it is streaming in, significantly shortening the time from sensor to decision. In addition, only the data that users need to be concerned with is presented to them. If a rapid response to certain conditions is required, there’s no need to burden users with data where those conditions are not met.

IT should realize that data is extremely important to the success of analytics initiatives. Every piece of data history that is abandoned on the roadside could have implications down the road for an organization’s ability to understand how and why assets and resources behave in certain ways, and how they might behave in the future.

He then goes on to give this example of situational intelligence in action

users might want to understand which assets (such as machines or pieces of equipment) are currently operating under stress, access the details for those assets, determine whether temperature or other environmental conditions should be considered, assess the impact on service delivery if one of those assets fails, pull up the cost and revenue implications of such a failure, and take action to prevent that scenario from taking place.

To pull this off in the past would have required multiple people accessing multiple systems and manually correlating the data. With situational intelligence, it all takes place in one application, and users in different roles all have access to consistent information as they collaborate to address issues…

If a user is trying to understand which of millions of assets are at risk of failure for example, it doesn’t make sense to show all the assets on the screen and let the user sort through them. Instead, analytics can identify and prioritize the most critical assets, helping the user focus on the task at hand. With an approach like this, it is possible to derive immediate value from data, justifying further investments in big data and analytics infrastructure.

I would highly recommend reading the two part article if you are looking for more information on Data Analytics, IoT and Big Data

It’s not just about how, when and where data is captured and stored. It’s about how, when and where value is derived from that data.

Why The Chief Digital Officer Exist

Another crucial skill for CIOs is around data analytics. I say that simply because there is so much data coming from so many sources that IT has to become adept at collecting, organizing, reducing (that is, cleaning and consolidating), and redistributing that data. The only way you can do that is if you understand the sources, have a logical course of action thought through with the data, and at the other end know how you can use the most actionable, consolidated data to the benefit of the company.

This is critical because the volumes of data that a client can have today are truly astronomical. It’s great for the companies that produce data storage. But the problem with so much data is you’ve got to do something with it. The IT department needs to take a lead in that. If they don’t, they may soon have a chief digital officer in their ranks, and in my opinion, the concept of the CDO exists because the company doesn’t believe that IT is capable of dealing with its data.

Excerpted From: Enterprisers Project

Five Truths To Consider When Managing E-Mail

1)Managing the lifecycle of information created or received in an email format is no more critical to the success of your organization than managing the lifecycle of any other electronically stored information.

2)Managing the lifecycle of information created or received in an email format is no more difficult than managing the lifecycle of any other electronically stored information in your organization

3)Very few emails actually hold any real long term value.

4)Manual email records management solutions will fail to be adopted by end users 100% of the time

5)Automated record classification using content analytics products doesn’t work for emails.

you can read more information by Don Leuders on the topic in his blog
Email Records Management- Part 1: The Truth

A Prediction From #RSD for #InfoGov in 2016

“In 2016, we see a new trend emerging: just as the content management systems and practices become decentralized, so do governance projects. In the past, this was impossible, with governance platforms aimed at the corporate-level (and priced accordingly). We see a trend towards reducing the barrier to adoption, allowing department-level records management teams to undertake these projects at a much smaller scope (and, naturally, budget).”

You can read the rest at 2016 will be a tipping point in the Information Governance Space