Information Governance Insights: Spring Cleaning Time!

Information Governance Insights: Spring Cleaning Time!

Groundhog Day has come and gone. Whatever the prognostication Spring is definitely on the way! This signals the ancient tradition of Spring Cleaning! It’s time to open the house up and get rid of the refuse that has gathered over the winter months. The same goes for all organizations. Information Governance Professionals should take a hint from human nature and have their own Spring Cleaning Day to review the existing files and, following the Records Retention Schedule.

Information Governance Insights: Spring Cleaning Time!

Information Governance Insights: Spring Cleaning Time!

Groundhog Day has come and gone. Whatever the prognostication Spring is definitely on the way! This signals the ancient tradition of Spring Cleaning! It’s time to open the house up and get rid of the refuse that has gathered over the winter months. The same goes for all organizations. Information Governance Professionals should take a hint from human nature and have their own Spring Cleaning Day to review the existing files and, following the Records Retention Schedule.

Information Governance Insights: Looking Ahead – Get Your Training Plan Ready!

Information Governance Insights: Looking Ahead – Get Your Training Plan Ready!

Information governance should be part of the annual training regime at every organization right along with safety and sexual harassment. In many organizations, these types of sessions are required for compliance. For others, it is recommended as a standard business process. Regardless, information governance should be part of the curriculum. If this is not the case in your organization you should be meeting with your training department staff immediately and bring it to their attention.

Information Governance Insights: Repeat After Me – Cyber Security is Everyone’s Business

Information Governance Insights: Repeat After Me – Cyber Security is Everyone’s Business

“Hacks” and Identity Theft have been around for a very long time, but over the past few years, the hackers have changed tactics and are targeting whole systems for attack. Ransomware is the latest incarnation of this where clicking on a single email can launch an attack that will lock down an entire organization and render their computer inaccessible until a “ransom” is paid to the hacker for the promise of an access code to unlock the system.

Accessibility

Pin It on Pinterest