Identity Theft – The Matt Honan Nightmare – EVERYONE’S NIGHTMARE!

Identity Theft – The Matt Honan Nightmare – EVERYONE’S NIGHTMARE! See this:

Mat Honan, just had his digital life dissolved by hackers. Photo: Ariel Zambelich/Wired. Illustration: Ross Patton/Wired Magazine reprint

It is time I jumped in on this discussion. I have done a lot of research. The article at the link above hosted by Wired Magazine, sums up the sequence of events that expose Continue reading


Cloud Storage – Better reassess your strategy with Microsoft.

Better reassess your Cloud Storage SkyDrive strategy with Microsoft. Microsoft Online Division (Meaning Cloud Computing, including their Cloud Storage SkyDrive business.) is losing money hand over fist. This is not a sustainable business model. In an article by Jay Yarow posted on Business Insider today 7-2-12, it states a bleak prospect for Microsoft’s Online Division.

Microsoft’s Online Division Is Taking A $6.2 Billion Write Down Because Of Its Failed aQuantive Acquisition. As earlier posted in this Blog on October 9, 2011 the Online business at Microsoft is hemorrhaging cash. Add $6.2 Billion to this graph.

Cloud Storage microsoft-burns-another-half-billion-online

Microsoft Online business performance

How long will the Microsoft Board of Directors tolerate this kind of financial performance for this Division? Something has to give. The question is – What?

Steve Ballmer

Steve Ballmer

You as an individual need to make many difficult decisions in your life. Some are pretty obvious. There will be change in the Cloud Computing Group at Microsoft. Your data is at risk. In 2009 Yahoo closed it’s “Briefcase” Cloud Storage offering. Apple, just closed it’s MobileMe Cloud Storage offering (2012) and replaced it with iCloud, BUT DID NOT OFFER to move your data. You need to do that yourself. If you can figure it out yourself.

The financials at Microsoft’s OnLine Division do not bode well for consistency and sustainability of this offering.

Call to Action: Control your own destiny. Manage your data locally by having a local copy of all of your data, with an archived copy in a safe remote place. Then and only then use Cloud based Storage Service offerings. This cannot be more clear to me. Our information as individuals is at risk. Is it clear to you? I hope so. Please note, I am not saying do not use these services. I am saying make them a “Part of your strategy” not your entire strategy.


Peter Gailey
The Personal Information Management Coach
The PIM Coach


Backup and Recovery for Personal Information

Panic and inconvenience or Disaster? Shocking! Toy Story 2 Almost Never Happened!

I normally do not quote Parez Hilton, but Continue reading


“Pros and Cons of BYOD”

“Pros and Cons of BYOD”

I am an expert in Personal Information Management – PIM. The risks associated with BYOD are great. AND surprise… the risks go both ways.

RISKS to the Enterprise:
1.) Security Breaches.
2.) Bots, Bugs, Trojan Horses, Malware, etc.. Does the Iranian Centrifuge incident ring a bell? Extreme example to be sure, but corporate sabotage is a very real threat.
3.) Corporate embarrassment. An employee has illegal content (Pornography, Corporate secrets of another firm.) on their device. The device is confiscated for legal purposes, discovery in a court case for example. This could be made public.
4.) Very real “opportunity loss” scenario: A sales Rep is using their iPad 3 while they are on a Sales Call at HP, Dell, Samsung, Google or any competitor with a tablet offering. Same for the phone they use. You could very easily lose the opportunity and never know why.
5.) Loss of productivity. Depending on the applications involved, not all applications may be usable on all devices. iOS cannot and will not read Flash is a good example. A corporations training videos, and or demonstration materials are in flash. Won’t work in the Apple world.
6.) Cost associated with potentially needing to re-write code into HTML-5 a platform agnostic platform.
7.) Support issues, and costs to support multiple platforms. May need to invest in several platforms in order to be able to replicate the problem in order to rectify it.

RISKS to the Employee:
1.) Personal devices will undoubtedly contain business information, making them eligible to be ceased in the case of a law suit. Discovery will mandate either temporarily or permanently confiscating the device for forensic purposes.
2.) The replacement of the device at issue may not be reimbursed by the company.
3.) You will undoubtedly have very personal information on your device. If it is confiscated, that information becomes of a public nature at the whim of the legal system.
4.) If the primary use of the personal device is of a business nature, and it is lost or stolen, the firm may not reimburse you for it.
5.) Backing up the information of your personal device will undoubtedly involve some business information. It is very difficult not to mix and segregate personal and business information. So, it follows that you may have business information on your back-up systems. This puts those systems at risk of confiscation in the case of litigation and discovery as addressed in #1.
6.) You as an individual get let go. The corporation, or Agency knows you have sensitive information on your phone, notebook, PC and or tablet. IF the information is of a very sensitive nature, and it is critical to Homeland Security, or a State or Federal Agency, it may be confiscated on the spot. Then you are on the street with no tools. When was the last time you backed up all your systems? And put the information in a “Safe Place”? You will never get those back!!
7.) Use all front end security measures to secure your devices. You do not want to be the individual that carries in the Trojan horse virus. It happened at Sun Microsystems in about the year 2001. And the “Executive” got called on the carpet in front of approximately 9,000 employees for it.

CALL TO ACTION: Mitigate the risk:
Keep personal and business devices separate. Make sure you have a reasonable business and personal backup strategy. Execute that strategy on a regular basis. Have specific Corporate Policy that details what the “Exit” strategy is for employees BYOD tools. Always use security measures on your personal devices. The first thing you see when you pick up your phone or tablet… should be a screen that asks for a security code!!


Peter Gailey
The PIMCoach


New findings for small business relate to you as an individual.

Persoanl Information Management (PIM) by backing up your personal information and data is critical to your personal well-being. A recent article in the small business section of illustrates how important the proper backup of data is for Continue reading


Personal Information Management – Closing out the year – Items to do

12-31-11 the year is coming to a close. Another year behind us. More personal data has piled up in our individual lives than we can possibly manage without a Continue reading


How to protect your personal information. PIM Tips

How to protect your personal information. Personal Information Management (PIM) safety tips to follow.

Your personal information management is your responsibility. No-one else cares, or is going to protect you from “Bad People” doing bad things to you. “A study conducted earlier this year by the Ponemon Institute revealed Continue reading


Simplify your life with these 12 Personal Information Management tips

Simplify your life with these 12 Personal Information Management – PIM tips.

The numbers of distractions that interfere with your lives have grown radically over the last few years. Distractions in the form of information, are poised to get much more complicated and voluminous in the future. The main problem is Continue reading


This is a MUST Read regarding Personal Information Management (PIM)

This is a MUST Read regarding Personal Information Management (PIM)

Results of a survey conducted by Wakefield Research include the following (Note-1):

* 51% of Americans have experienced a computer crash where they lost ALL of their digital files.
* More than one-third (39%) admit they have never Continue reading


Keep personal information (PIM) and work data seperate! Here’s why.

Keep personal information and work data separate! Here’s why.

Cisco Systems recent study data: “68% of employees and 71% of college students believe corporate devices should be used for Social Media and Personal use, too” See Note: 1

This is an understandable set of conclusions, and desires on the part of employees. But a very bad policy choice for both the companies and the individuals. Here’s why. Continue reading