Tag: risk management

warning sign: thin ice

Information Management

Are Your Risk Assessments Reliable?

How confident is your chief risk officer in their risk assessment? Are they 100% confident? 90% or 80%? CROs need to understand the margin of error.

person walking past a large bank, looking down and typing on their phone

Digital Workplace

What $1B in Fines for WhatsApp Use Tells Us About Usability and Compliance

A fine this large will inspire many IT leaders to crack down on unauthorized app use. What's needed is a more pragmatic approach.

person walking, casting a long shadow in a brightly lit public area

Digital Workplace

Can Low-Code/No-Code Be the Answer to Shadow IT?

At a time when shadow IT is on the rise, can providing workplace-sanctioned low-code and no-code platforms offer a solution?

two friends on a roller coaster

Information Management

Cybersecurity Isn't an IT Risk, It's a Business Risk

Cybersecurity risk assessment should be an integral part of the organization’s enterprise risk management program and decision-making, not a siloed operation.

paper plane about to fly

Digital Workplace

Why Email Security Remains a Problem and How to Mitigate the Risk

Despite widespread awareness of increasing cyberattacks, insufficient email security remains one of the biggest vulnerabilities.

woman laughing as a colleague looks on (back when we could share offices)

Talent Management

The Greatest Risk and the Greatest Asset: People

Internal audit needs to be alert to poor performers, at any level. They also need to be alert to the failure to recognize and reward high performers.

arrow on a road pointing in two directions

Information Management

Should Information Management Focus on the Customer or Risk?

Information management professionals gave our collective efforts a C grade last year. What can we do to improve that grade?

Red panic button against a white wall

Information Management

It's Time to Re-evaluate Your Cybersecurity Strategy

Organizations should take a closer look at their risk profile and update security measures in light of hybrid work and mounting cybersecurity threats.

head in hand

Information Management

Get Your Information Governance Act Together in 2022

Which would you rather be when new information challenges arise: proactive or reactive?

surveillance camera

Information Management

How Baseline Security Practices Could Have Prevented Recent Cloud Attacks

The recent attack on enterprise infrastructure underlines how important baseline security measures really are.

traffic jam

Information Management

Mancini's Law Says: Information Chaos Has Consequences

Without intervention, information chaos will threaten the viability of our systems. The ransomware attacks are one of the visible consequences.

Conceptual World Backup Day background, memory cards, hard drives, and thumb drives

Information Management

World Backup Day: Data Backup Is a Key Element of Digital Transformation

On this World Backup Day, we explore how data backups are key to good business and digital transformation.

seesaws in empty playground

Information Management

How Effective Process Management Can Reduce Business Risk

There is a close link between business processes and risk levels. Learn how to manage the former to reduce the latter.

bicyclist jumping off  a ramp in mid-air

Information Management

What Is Wrong With a Typical Risk Register?

How can the risk register be improved?

devops - continuous monitoring

Information Management

Continuous Monitoring: The New DevOps Trend

Continuous monitoring can be traced back to traditional business auditing practices. However, it goes further than the audits most companies are used to.

heart shaped lock

Information Management

Why You Need a Plan for Content Security in Microsoft 365

Microsoft 365 has a ton of great applications, all with their own security implications.

the shadow  of  an arm stretching  out

Information Management

Don’t Be Afraid of the Dark: Bring Dark Data Into the Light

Finding and managing the dark data you don’t know about is a big project, but is worth the effort.

pros and cons

Information Management

A Simple Risk-Driven Decision Technique

A process I learned in my youth

woman walking a tightrope between two mountains

Collaboration & Productivity

Striking the Security and Enterprise Collaboration Balancing Act

Organizations need solutions, processes and cultures that foster an ongoing dedication to information security without getting in the way of productivity.

broken computer  screen

Information Management

Even the Best Laid Plans Forget This Security Gap

The risks and potential liability of ineffective data destruction at end of life are too high for organizations to risk.