Information Overload and Social Media – Poll numbers

Information overload and Social Media – Poll numbers reveal 79% of audience feels symptoms of Information overload. This is a revealing statistic when you consider that Social Media is a minor portion of the information that is inundating us as individuals every day. The conclusion is that with the addition of other data sources included in the Data Deluge that effects everyone, information overload is a universal issue effecting everyone.

Choices are necessary / mandatory to “Tame the Data Deluge” in our personal lives.

http://twtpoll.com/2zgf4l

Twtpoll created by @brainsolis
Continue reading

5f2c4776a07f3b0b57bca0edfa6f9afb

Backup and Recovery for Personal Information

Panic and inconvenience or Disaster? Shocking! Toy Story 2 Almost Never Happened!

I normally do not quote Parez Hilton, but Continue reading

742e18a4822457daa3ba5d7ab1835750

“Pros and Cons of BYOD”

“Pros and Cons of BYOD”

I am an expert in Personal Information Management – PIM. The risks associated with BYOD are great. AND surprise… the risks go both ways.

RISKS to the Enterprise:
1.) Security Breaches.
2.) Bots, Bugs, Trojan Horses, Malware, etc.. Does the Iranian Centrifuge incident ring a bell? Extreme example to be sure, but corporate sabotage is a very real threat.
3.) Corporate embarrassment. An employee has illegal content (Pornography, Corporate secrets of another firm.) on their device. The device is confiscated for legal purposes, discovery in a court case for example. This could be made public.
4.) Very real “opportunity loss” scenario: A sales Rep is using their iPad 3 while they are on a Sales Call at HP, Dell, Samsung, Google or any competitor with a tablet offering. Same for the phone they use. You could very easily lose the opportunity and never know why.
5.) Loss of productivity. Depending on the applications involved, not all applications may be usable on all devices. iOS cannot and will not read Flash is a good example. A corporations training videos, and or demonstration materials are in flash. Won’t work in the Apple world.
6.) Cost associated with potentially needing to re-write code into HTML-5 a platform agnostic platform.
7.) Support issues, and costs to support multiple platforms. May need to invest in several platforms in order to be able to replicate the problem in order to rectify it.

RISKS to the Employee:
See: http://pimcoach.com/predictions-by-2013-80-of-businesses-will-support-workers-using-tablets-personal-information-pim-ramifications/
1.) Personal devices will undoubtedly contain business information, making them eligible to be ceased in the case of a law suit. Discovery will mandate either temporarily or permanently confiscating the device for forensic purposes.
2.) The replacement of the device at issue may not be reimbursed by the company.
3.) You will undoubtedly have very personal information on your device. If it is confiscated, that information becomes of a public nature at the whim of the legal system.
4.) If the primary use of the personal device is of a business nature, and it is lost or stolen, the firm may not reimburse you for it.
5.) Backing up the information of your personal device will undoubtedly involve some business information. It is very difficult not to mix and segregate personal and business information. So, it follows that you may have business information on your back-up systems. This puts those systems at risk of confiscation in the case of litigation and discovery as addressed in #1.
6.) You as an individual get let go. The corporation, or Agency knows you have sensitive information on your phone, notebook, PC and or tablet. IF the information is of a very sensitive nature, and it is critical to Homeland Security, or a State or Federal Agency, it may be confiscated on the spot. Then you are on the street with no tools. When was the last time you backed up all your systems? And put the information in a “Safe Place”? You will never get those back!!
7.) Use all front end security measures to secure your devices. You do not want to be the individual that carries in the Trojan horse virus. It happened at Sun Microsystems in about the year 2001. And the “Executive” got called on the carpet in front of approximately 9,000 employees for it.

CALL TO ACTION: Mitigate the risk:
Keep personal and business devices separate. Make sure you have a reasonable business and personal backup strategy. Execute that strategy on a regular basis. Have specific Corporate Policy that details what the “Exit” strategy is for employees BYOD tools. Always use security measures on your personal devices. The first thing you see when you pick up your phone or tablet… should be a screen that asks for a security code!!

Regards,
Peter

Peter Gailey
The PIMCoach

7eded933eb8ce7e3657e862f97a7b4fe

Personal Information Management – Enterprise Scope and Scale, and you.

Personal Information Management is all about data. I have been trying to deliver the message that there is a “Data Deluge” happening in our personal lives. There is more data being generated than there is Continue reading

6f78f9ac3d2cd8358cd1a76afc9cf63c

Personal Information Management – Ever had a disk crash? Read this.

With regard to Personal Information Management – PIM – Millions of people experience a major loss of data every year!!

We all inevitably will suffer a disk crash on our primary personal computing device. This event will end up being either a minor inconvenience, OR a major disaster. Only you have the ability to influence which it is.

Below is a technique that will enable you to avoid the major disaster. It is called Continue reading

75e79ec7d3d678859374cf667234a45a

Personal Information Management – Closing out the year – Items to do

12-31-11 the year is coming to a close. Another year behind us. More personal data has piled up in our individual lives than we can possibly manage without a Continue reading

61201f96c4aea7215f29a820e81435e3

Simplify your life – Convert to Digital delivery! PIM tip

Every household in the U.S. receives 84 pounds of direct (bulk) mail each year. We use three working days to sort and decide what to do with it. Reference from – Para Publishing

Simplify your life by converting Continue reading

930f6c04deed55849b3ad4d3f12d3ff4

Most businesses will support tablets, personal ramifications abound!

Predictions: By 2013, 80% of businesses will support workers using tablets.

Gartner, one of the top analyst firms in the High Tech industry, has published its “Top Predictions for 2011:” One of the predictions – “By 2013, 80 percent of businesses will support a workforce using tablets.”*

What does this mean to you as an individual as it relates to your Personal Information Management, PIM Strategy? It means many things. Continue reading

6589d151dba0eeb085c84d974f4932c9

Personal Information Management – PIM & Identity Theft Quiz

Personal Information Management – PIM & Identity Theft Quiz

I just came across a great on-line tool that performs a Personal Information & Identity Theft Quiz, and gives you instant results. This is a great tool and I highly suggest you Continue reading

75976fb1409d94bce7781eb37f357156

This is a MUST Read regarding Personal Information Management (PIM)

This is a MUST Read regarding Personal Information Management (PIM)

Results of a survey conducted by Wakefield Research include the following (Note-1):

* 51% of Americans have experienced a computer crash where they lost ALL of their digital files.
* More than one-third (39%) admit they have never Continue reading

5479adbe07884b2245aa2f753e0f24d2