The Challenge of Merging Enterprise Content Management With Mobile Content Management

Enterprises have to address content mobility in their enterprise content management strategies to properly manage this content. MCM offerings have to do more than just two-factor authentication as enterprise security needs become deeper. Overall strategies must look at and address the content, apps and devices, with attention tocontent version control, user access privileges, locking content and collaboration around the content.

So, while users can sign up for cloud storage services, IT should also ensure that content can be federated: stored in a secure, managed repository for security, compliance, long-term asset tracking and records management.

You can read the rest on Document Media in Your Content Is On The Move: Is It Secure?

Why The Shift To Information Governance

the sheer volume of content, the frequency of creation and the number of formats makes the application and execution of these traditional policies and processes difficult, hence the need to transform records management for information governance. Don’t get me wrong I’m not saying the records management policies or processes need to change, but more how we apply them to our content and ensure they are built-in to day to day processes without burdening the large proportion of staff who now have responsibility for records management without the records management training.

You can read more on the HP blog in “Information Governance: Transforming records management for information governance

Shining the Light of Compliance on Dark Data

Technology offers business users with “spell checking” in most authoring systems, and we expect that communications sent for business purposes will not have spelling mistakes. Compliance technology needs to bring this power and simplicity to the world of data protection and classification, with user-assisted tagging and automated classification. By repurposing these compliance systems to not only discover “dark data” for compliance purposes, but also for knowledge management and data discovery purposes, organizations will find they are effectively:

  • Lowering overall total cost of ownership
  • Enabling business self-service
  • Accelerating data access and collaboration capabilities
  • Adhering to compliance policies and mitigating data risks

For effective data management and collaboration to turn into a competitive advantage for the business, timely access to data as well as multi-directional communication flow — with the right risk management filters in place — is essential. This way, data is available whenever and wherever to those who need it, and unavailable to those who shouldn’t have access.

You can read more on CMS Wire in Dark Data As A Company Asset

The Six Figure Cost Savings of Digital Asset Management

Companies that use DAM systems to manage digital content recoup nearly $200,000 over a period of five years. Conversely, those that don’t are losing an average of $44,000 per year.

You can read the rest on Fierce Content Management in Infographic: Digital Asset Management Save Companies Thousands Every Year 

Would You Keep All That Data If It Was In Paper Format

Corporate attorneys Judy Selby and James Sherer put together an interesting blog post examining why it’s so difficult for employees to part with old email, documents and other unneeded data. They liken the behavior to hoarding, offering some insight into the reasons behind it and how you can help your workers rationalize getting rid of detritus there’s no longer any reason to keep.

While Selby and Sherer’s intentions are good, their advice is probably more academic than it is practical.

The pair suggests first reasoning with workers. Ask employees to focus on the data that they’re currently saving and ask if they would retain any given record if it was on paper. Do they really need those 14 email messages outlining a friend’s lunch 6 months ago?”

You can read the rest on Fierce Content Management in an article entitled, Convincing Workers To Part With Unneeded Data

Facebook Messenger App Drawing Similarities to Spyware

It should come as no surprise that most mobile apps run some sort of analytics on user behaviour. But in the case of Facebook, the social network’s Messenger app for iOS apparently tracks quite a bit more than most users likely realize.


iOS forensics and security researcher Jonathan Zdziarski spent Tuesday morning disassembling Facebook Messenger’s iOS binary, at one point declaring via Twitterthat “Messenger appears to have more spyware type code in it than I’ve seen in products intended specifically for enterprise surveillance.”

You can read the rest at: Facebook’s Messenger App is Tracking a Lot More of your Data Than You Think

Why You Need A Good BYOD Policy

McAffee did research that shows that 3.7 millions samples of Android malware were observed in 2.1  That is three times the 1.3 million samples in 2012.  Many organization are aware of this which is why it is believed that implementation of BYOD policies will more than double in the next two years from 31% in 2014 to 77% in 2016.  You can read more in the infographic below from McAffee which is borrowed from Biztech Magazine

Courtesy of Biztech Magazine


Get every new post delivered to your Inbox.

Join 389 other followers