A few days ago I heard someone refer to the years 2000 – 2009 as “The Noughties”, derived from the English word nought which means zero. I prefer calling this last decade the naughties because of both improper and mischievous behavior I have seen in the business world. The improper behavior has resulted in scandals and security breaches. I view the mischievous behavior as something positive. People who are mischievous have a twinkle in their eye and dare to take on conventional wisdom. A lot of the progress in human history came from someone who thought differently and wanted to shake things up.
Two of the biggest items to illustrate both sides of naughty in the last 10 years are the emergence of cloud computing and the abuse of information security. The former will become the way of the world for computing and information access. The latter has become a continuous scourge of scandals and security problems. Read the rest of this entry »
Hopefully you won’t have to answer this question, but more than likely you will. The headlines are full of stolen documents or hacked databases, but most of the data breaches never see the light of day. Why not? Because no one wants to talk about their failures and vulnerabilities. If I tell you that your confidential information is now making its way around the Internet, you will lose confidence in me. You might go to my competitor or tell your friends to avoid my company. None of these sound good.
So what do you do?
Read the rest of this entry »
In honor of the last night of Hanukkah, I want to give thanks for the miracle of SaaS. Here are my eight (8) favorite reasons to use SaaS.
1. Access anywhere – use my application from anywhere through a browser
2. Access from any device – use on any device (with a browser, iPhone or Android app)
3. Great mashups – combine with other services on the web to create new applications
4. Collaboration – exchange information with anyone since everything is on the Internet
Read the rest of this entry »
A recent article about the failure of the Bush White House to install a proper electronic record keeping system shows another example of the breakdown of people and process in data governance. The article talks about recovering 22 million missing emails, when earlier officials claimed nothing was missing. There are federal laws that require the White House to preserve its records, so a lack of execution was in evidence here. Read the rest of this entry »
Executives and Board Members of various Public and Private Organizations endure many sleepless nights thinking about potential data security and leaks. Almost daily you read about another major breach. Organizational leaders are becoming painfully aware and sensitive to the growing challenges of the external and internal risks surrounding data security. This is today’s reality for Senior Executives, Corporate Officers, Board Directors, inside or outside Counsel, Auditors and Investors involved in Public, Private, Government or quite frankly any organization. Read the rest of this entry »