Remove Case Study Remove Course Remove Government Remove Paper
article thumbnail

Successful Information Governance when the Bosses Just Don't Care

AIIM

We regularly discuss the value and importance of information governance - at our conference, in our training courses, in our virtual events. How can you move your organization's information governance program forward in the absence of management support or interest? FREE How-To Guide from AIIM: Information Governance 101].

article thumbnail

Worrying Ransomware Trends, and What to Do About Them

IT Governance

Many have their own logos and conduct job interviews, and there have even been calls for research papers on the dark web! Of course, the UK government advises against paying ransoms, but doesn’t legally enforce this, unlike some other countries. What ransomware trends have you noticed? That’s very tricky to answer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why we need long-term thinking for long-term records

Preservica

As records management professionals, we’re still fighting the thorny issue of getting people to pay attention in the normal course of business operations to records that need care and protection. The other side of the coin of course is compliance and risk mitigation.

article thumbnail

Establishing Records Management at Brandeis—The First Eighteen Months

Brandeis Records Manager

And of course, we’re all fully staffed, right? One highlight of the leadership briefing was a picture slide that showed a 1994 student paper headline about confidential records found in an open recycle bin. the many fronts that records touch within the organization make us feel like we need an army to even chip away at solutions.

article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

In response, President Biden last week issued an executive order requiring more rigorous cybersecurity practices for federal agencies and contractors that develop software for the federal government. government. government should provide and curate a catalog of resources, such as configuration, tools, etc.,