Personal Data Security tip for your phone – Recent study.

Personal Data Security tip for your phone – Recent study.

In a recent study it was calculated that 67,000 phones likely will be lost or stolen during London Olympics.

http://www.venafi.com/67000-phones-likely-to-be-lost-or-stolen-during-london-olympics/

That is a staggering figure. Each of those individuals will have Continue reading

6723a32fce0560b328cb74f168c567fa

Cloud storage security – What CIOs think.

“PIM Coach’s tip of the day” Cloud storage security less robust than you think – FierceCIO – See what CIOs think http://t.co/wtN9A7jm

This FierceCIO article represents what my messaging is all about, but from a slightly different angle. IF 64% of the Chief Information Officers polled do not trust Cloud Storage, Continue reading

504678a2a44bb9f09f2642f992dca22e

Personal Information Management, Risk and strategy to avoid that risk

Personal Information Management – Risk and a strategy to avoid that risk

A study performed by Vanson Bourne and EMC (One of the top data Storage firms in the world.) found that, “Most UK companies don’t believe they can completely restore their data after downtime or data lost.” This is a frightening finding as it relates to us as individuals. Here’s why. Continue reading

b26cd64f63d60caddf5fe131bad47424

How to protect your personal information. PIM Tips

How to protect your personal information. Personal Information Management (PIM) safety tips to follow.

Your personal information management is your responsibility. No-one else cares, or is going to protect you from “Bad People” doing bad things to you. “A study conducted earlier this year by the Ponemon Institute revealed Continue reading

06148830a89e75be135d82c152b6ed46

Personal Information Management – PIM & Identity Theft Quiz

Personal Information Management – PIM & Identity Theft Quiz

I just came across a great on-line tool that performs a Personal Information & Identity Theft Quiz, and gives you instant results. This is a great tool and I highly suggest you Continue reading

75976fb1409d94bce7781eb37f357156

This is a MUST Read regarding Personal Information Management (PIM)

This is a MUST Read regarding Personal Information Management (PIM)

Results of a survey conducted by Wakefield Research include the following (Note-1):

* 51% of Americans have experienced a computer crash where they lost ALL of their digital files.
* More than one-third (39%) admit they have never Continue reading

5479adbe07884b2245aa2f753e0f24d2

Keep personal information (PIM) and work data seperate! Here’s why.

Keep personal information and work data separate! Here’s why.

Cisco Systems recent study data: “68% of employees and 71% of college students believe corporate devices should be used for Social Media and Personal use, too” See Note: 1

This is an understandable set of conclusions, and desires on the part of employees. But a very bad policy choice for both the companies and the individuals. Here’s why. Continue reading

ab56fc82884023b6c19863b80e43292d

Identity theft: It has happened to you. What should you do?? PIM Tip

Identity theft: It has happened to you… What should you do?? Personal Information Management Tip

Thieves act quickly in Identity Theft scenarios. Your Personal Information will be compromised within hours. The more quickly the bad guys act, the lesser the probability they will get caught in the act. The moment you realize that something is not right, and you suspect your identity has been stolen follow these fairly simple steps Continue reading

9561c9d221e8692f5fa64d1de32e95c4

How to create secure Passwords – Personal Information Management – PIM Strategy

How to create secure Passwords:

A significant part of your Personal Information Management strategy is related to security, and Privacy. Nothing is more fundamental than your Password management technique.

Consequences of not creating secure passwords include – bad people getting into your data and Continue reading

ed2bee5bcc66aab92b4d60744b7c8f59

How to: Manage your Phone – PIM training tip

How to: Manage your Phone – PIM training tip

Consider your phone as a very valuable tool in your Personal Information Management – PIM – strategy. It should also be considered to be a very dangerous and vulnerable access point for a lot of your critical data. If managed improperly, it is Continue reading

c6c14ceda2928fde6d8e21338f34f8ca