Identity Theft – The Matt Honan Nightmare – EVERYONE’S NIGHTMARE!

Identity Theft – The Matt Honan Nightmare – EVERYONE’S NIGHTMARE! See this: http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/

Mat Honan, just had his digital life dissolved by hackers. Photo: Ariel Zambelich/Wired. Illustration: Ross Patton/Wired Magazine reprint


It is time I jumped in on this discussion. I have done a lot of research. The article at the link above hosted by Wired Magazine, sums up the sequence of events that expose Continue reading

5d824e232354c349c8b8183a1f8be6d7

Most businesses will support tablets, personal ramifications abound!

Predictions: By 2013, 80% of businesses will support workers using tablets.

Gartner, one of the top analyst firms in the High Tech industry, has published its “Top Predictions for 2011:” One of the predictions – “By 2013, 80 percent of businesses will support a workforce using tablets.”*

What does this mean to you as an individual as it relates to your Personal Information Management, PIM Strategy? It means many things. Continue reading

6589d151dba0eeb085c84d974f4932c9

This is a MUST Read regarding Personal Information Management (PIM)

This is a MUST Read regarding Personal Information Management (PIM)

Results of a survey conducted by Wakefield Research include the following (Note-1):

* 51% of Americans have experienced a computer crash where they lost ALL of their digital files.
* More than one-third (39%) admit they have never Continue reading

5479adbe07884b2245aa2f753e0f24d2

Keep personal information (PIM) and work data seperate! Here’s why.

Keep personal information and work data separate! Here’s why.

Cisco Systems recent study data: “68% of employees and 71% of college students believe corporate devices should be used for Social Media and Personal use, too” See Note: 1

This is an understandable set of conclusions, and desires on the part of employees. But a very bad policy choice for both the companies and the individuals. Here’s why. Continue reading

ab56fc82884023b6c19863b80e43292d

How to create secure Passwords – Personal Information Management – PIM Strategy

How to create secure Passwords:

A significant part of your Personal Information Management strategy is related to security, and Privacy. Nothing is more fundamental than your Password management technique.

Consequences of not creating secure passwords include – bad people getting into your data and Continue reading

ed2bee5bcc66aab92b4d60744b7c8f59

How to: Manage your Phone – PIM training tip

How to: Manage your Phone – PIM training tip

Consider your phone as a very valuable tool in your Personal Information Management – PIM – strategy. It should also be considered to be a very dangerous and vulnerable access point for a lot of your critical data. If managed improperly, it is Continue reading

c6c14ceda2928fde6d8e21338f34f8ca

How to protect your Personal Information from mischief by bad people

How to protect your Personal Information Management PIM, systems from mischief by bad people.

1.) Run a security package. A Firewall for your network, and system security for each device.
2.) Use the latest versions of Continue reading

392b1a1791cdf6a673034060458c98d0

October 1st. – The First day of a new quarter. Personal Information Management – PIM TIPS

Today is October 1st, the first day of a quarter. It is a significant day as it relates to personal information management. The first day of every quarter is a significant day as it relates to performing tasks to “Manage the Data Deluge”.

My goal is to coach individuals to get into a rhythmic routine they’ll follow. The first effort is Continue reading

162650eadc99b340e1e49e14c72c4a06