Print

Print


Data sprawl is an issue facing organizations of all types and sizes.
Information of all kinds is being stored in a wide variety of places within
organizations. Identifying the "crown jewels" that are of the utmost
importance to protect is not an easy process. It is one that will take
considerable time, energy and coordination across the business. It requires
knowledge and a good understanding of data locations, data ownership and
data flows both inside and outside of the company, regardless of whether it
involves regulated or compliance-related information. If these pieces of
data end up in the wrong hands because of poor security, they can have
considerable negative consequences for the company.

There are several steps for creating a process to identify the cyber assets
that are critical to meeting an organization’s mission:


http://bit.ly/2MhLy7G
http://bit.ly/2MhLy7G+


-- 
Peterk
Dallas, Tx
[log in to unmask]
Save our in-boxes! http://emailcharter.org
“If only there were a massive entity that I were forced to fund to tell me
how I should live my life, since I’m so obviously incapable of deciding for
myself.” M. Hashimoto

To view the list archives go to: https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=RECORDS-MANAGEMENT-UK
To unsubscribe from this list, send an email to [log in to unmask] with the words UNSUBSCRIBE RECORDS-MANAGEMENT-UK

For any technical queries re JISC please email [log in to unmask]
For any content based queries, please email [log in to unmask]