Good information governance is good business practice

reduce risks, improve performance, collaborate securely and achieve compliance

Cover from Good information governance is good business practice

Date: 27th May, 2014
Format: White Paper

Download (subject to terms)
To access this paper you must first register and then login

Modern technologies are extending the perimeters of networks well beyond their traditional boundaries to encompass all manner of external applications, device and users. Mobile technologies have redefined the way we work, providing easy access to information and communications, and give workers greater freedom to work in the way that suits them best. Today’s technologies have expanded opportunities for efficient collaboration, both among internal employees as well as with third parties such as business partners and customers. Documents can freely be exchanged, improving productivity by making information available as and when it is needed.

However, much information produced within organisations is sensitive in nature, such as proprietary intellectual property and financial information that should be restricted to a specific audience with approval to view and work with it. It can be extremely damaging for any organisation that sees such information fall into the wrong hands, so restricting how it can be accessed and communicated is vital. Further, corporate records are extremely valuable to criminals, who are using increasingly sophisticated techniques to launch attacks against networks for the sensitive information they contain, often stored and communicated within business documents in commonly used formats.

This document discusses how technology enables more effective business collaboration and communications, as well as the tools that should be deployed to ensure that information is kept secure, free from inadvertent or malicious compromise. It is intended for organisations of all sizes in any industry.

Post a review?

We welcome constructive criticism on all of our published content. Your name will be published against this review after it has been moderated. We reserve the right to contact you by email if needed.

Star Rating 1-5 (low-high):

If you don't want to see the security question, please register and login.