article thumbnail

Survey reports skills in technology and Digital Preservation will be most desired in the next five years

Preservica

With the increasing amount of digital content being created and stored every day, the risk of digital information being lost or becoming inaccessible is growing. The Role of Technology in Archival Practices The results of the survey revealed the skills that archivists expect will be most important in the next five years.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Related: Atrium Health breach highlights third-party risks. Third-party cyber risks are likely to persist at the current scale for a while longer. According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Information Disaster Plan

The Texas Record

You will be able to continue operations and meet objectives with less risk of serious disruption if you ensure that you have continuous access to your information. The Federal Emergency Management Agency (FEMA) maintains the National Risk Index that helps identify the most applicable natural disasters to a geographical location.

Paper 98
article thumbnail

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. sick days as established by a Chartered Institute of Personnel and Development survey. on the Richter scale.

Risk 75
article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Why the cyber security skills gap is so damaging

IT Governance

In many cases, employees’ time and resources are spread so thinly that the quality of the work suffers. Employees often say that they spend too much time on incident response and not enough on planning ways to prevent incidents from recurring and to mitigate the risk of serious incidents. Some organisations have begun to address this.

article thumbnail

Why we need long-term thinking for long-term records

Preservica

Ensuring that long-term business critical records are authentic and readable for as long as they are needed, spans both the value and risk spectrum. Less risk, more reward. The other side of the coin of course is compliance and risk mitigation. Businesses also need to mitigate risk by anticipating technology change.