Protect your Personal Information

Protect your Personal Information. It is at risk. IS Leon Panetta Chicken Little? IMHO NO! Read the information below. It is not just banks and financial institutions that are at risk for Cyber Attacks. An old saying comes to mind. “Why do bank robbers rob banks? Because that is where the money is!” The tools that we all use like e-mail sites (Google, Yahoo, Microsoft etc.), Social Media sites like Facebook, Twitter, LinkedIn, Yahoo, to name a few, are all being relentlessly attacked and we do not hear about it. It is not a matter of IF these services will be highly compromised, it is a matter of WHEN. Continue reading

b9f6e431b64665aeb28b5f9ab3ebd62f

Personal Information Management in a Hurricane

Personal Information Management in a Hurricane.

Your personal information is one of your most valuable assets. Being able to get to your critical information may save your life. Or a loved ones. Earlier this week I described and defined a comprehensive safe backup and archive routine. See: Continue reading

12f58e86b2c65886b66561c629bdce6c

Identity Theft – The Matt Honan Nightmare – EVERYONE’S NIGHTMARE!

Identity Theft – The Matt Honan Nightmare – EVERYONE’S NIGHTMARE! See this: http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/

Mat Honan, just had his digital life dissolved by hackers. Photo: Ariel Zambelich/Wired. Illustration: Ross Patton/Wired Magazine reprint


It is time I jumped in on this discussion. I have done a lot of research. The article at the link above hosted by Wired Magazine, sums up the sequence of events that expose Continue reading

5d824e232354c349c8b8183a1f8be6d7

Your data is at risk – Apple shuts down MobileMe

Your data is at risk – Personal Information Management – Apple shuts down MobileMe

Apple has closed their MobilMe Cloud based Storage service. They are actually Continue reading

55f3f808cdc68c795806920ca8a21959

Backup and Recovery for Personal Information

Panic and inconvenience or Disaster? Shocking! Toy Story 2 Almost Never Happened!

I normally do not quote Parez Hilton, but Continue reading

742e18a4822457daa3ba5d7ab1835750

Information Overload – Personal Information and an IBM White Paper

If you don’t believe me, Believe IBM!
Information overload is a reality. I am connecting the dots here. The issues are the same when it relates to both Personal Information Management and Enterprise information management.

Excerpts from a White Paper just released by IBM: The Coming Storage Armageddon: What Your Continue reading

51ba2e7644d5dcd5c082d77154d59ff9

Cloud Storage and Personal Information Management Strategy

Personal Information Management – “PIM Coach tip of the day”.

Google is about to announce the specifics of their increased on-line storage capabilities. Microsoft is pushing their online storage for individuals and Small and Mid size business. Proceed with caution. Here’s why… Continue reading

d64b3f29723caf7006c15fe91d8d164b

“Pros and Cons of BYOD”

“Pros and Cons of BYOD”

I am an expert in Personal Information Management – PIM. The risks associated with BYOD are great. AND surprise… the risks go both ways.

RISKS to the Enterprise:
1.) Security Breaches.
2.) Bots, Bugs, Trojan Horses, Malware, etc.. Does the Iranian Centrifuge incident ring a bell? Extreme example to be sure, but corporate sabotage is a very real threat.
3.) Corporate embarrassment. An employee has illegal content (Pornography, Corporate secrets of another firm.) on their device. The device is confiscated for legal purposes, discovery in a court case for example. This could be made public.
4.) Very real “opportunity loss” scenario: A sales Rep is using their iPad 3 while they are on a Sales Call at HP, Dell, Samsung, Google or any competitor with a tablet offering. Same for the phone they use. You could very easily lose the opportunity and never know why.
5.) Loss of productivity. Depending on the applications involved, not all applications may be usable on all devices. iOS cannot and will not read Flash is a good example. A corporations training videos, and or demonstration materials are in flash. Won’t work in the Apple world.
6.) Cost associated with potentially needing to re-write code into HTML-5 a platform agnostic platform.
7.) Support issues, and costs to support multiple platforms. May need to invest in several platforms in order to be able to replicate the problem in order to rectify it.

RISKS to the Employee:
See: http://pimcoach.com/predictions-by-2013-80-of-businesses-will-support-workers-using-tablets-personal-information-pim-ramifications/
1.) Personal devices will undoubtedly contain business information, making them eligible to be ceased in the case of a law suit. Discovery will mandate either temporarily or permanently confiscating the device for forensic purposes.
2.) The replacement of the device at issue may not be reimbursed by the company.
3.) You will undoubtedly have very personal information on your device. If it is confiscated, that information becomes of a public nature at the whim of the legal system.
4.) If the primary use of the personal device is of a business nature, and it is lost or stolen, the firm may not reimburse you for it.
5.) Backing up the information of your personal device will undoubtedly involve some business information. It is very difficult not to mix and segregate personal and business information. So, it follows that you may have business information on your back-up systems. This puts those systems at risk of confiscation in the case of litigation and discovery as addressed in #1.
6.) You as an individual get let go. The corporation, or Agency knows you have sensitive information on your phone, notebook, PC and or tablet. IF the information is of a very sensitive nature, and it is critical to Homeland Security, or a State or Federal Agency, it may be confiscated on the spot. Then you are on the street with no tools. When was the last time you backed up all your systems? And put the information in a “Safe Place”? You will never get those back!!
7.) Use all front end security measures to secure your devices. You do not want to be the individual that carries in the Trojan horse virus. It happened at Sun Microsystems in about the year 2001. And the “Executive” got called on the carpet in front of approximately 9,000 employees for it.

CALL TO ACTION: Mitigate the risk:
Keep personal and business devices separate. Make sure you have a reasonable business and personal backup strategy. Execute that strategy on a regular basis. Have specific Corporate Policy that details what the “Exit” strategy is for employees BYOD tools. Always use security measures on your personal devices. The first thing you see when you pick up your phone or tablet… should be a screen that asks for a security code!!

Regards,
Peter

Peter Gailey
The PIMCoach

7eded933eb8ce7e3657e862f97a7b4fe

Disk Drive Shortages hit home.

Disk Drive Shortages hit home. In November 2011 there were major floods in Thailand that effected the Information industry in profound ways. The Disk manufacturing plants of the worlds largest manufactures suffered widespread damage.

http://www.theverge.com/2011/11/5/2540403/thailand-flood-disaster

The results are far reaching as it relates to Personal Information Management and Continue reading

dba9c988dc80bed920f722ce52caefd2

Personal Information Management – Enterprise Scope and Scale, and you.

Personal Information Management is all about data. I have been trying to deliver the message that there is a “Data Deluge” happening in our personal lives. There is more data being generated than there is Continue reading

6f78f9ac3d2cd8358cd1a76afc9cf63c