Your Guide to Defining an Information Governance Policy

As more industries seek digital transformation - adopting conveniences such as cloud-based connectivity, frictionless operations, and more - their vulnerability to potential threats increases. When it comes to protecting sensitive information, is your company well-equipped to prevent email phishing scams, cybersecurity threats, and other attacks by bad actors

While sharing and collaborating on information assets is essential to streamline workflow within an organization, it's imperative to ensure that any shared information is only accessible by people who need to see it and that it is managed correctly. An information governance policy assures that not only is your company's most confidential data protected, but also that of every department and individual employee.

What factors must be considered when defining an organization's information governance (IG) policy? There are three main considerations that go into a strong IG policy approach:

1. WHAT needs to be protected?

Information that needs to be protected can be placed in one of two categories:

  • Personally identifiable information (PII)
  • Company confidential information (CCI)

Both sets must be protected, but for different reasons.

PII: It is a company's responsibility to protect the personal data of their employees and customers. There are now laws, such as Europe's General Data Protection Regulations (GDPR) and the California Consumer Protection Act (CCPA) that require such PII protections, safeguarding individual's interests and privacy.

CCI: It is a company's responsibility to protect its own sensitive data. There are myriad reasons that a company's private information stay in-house, the most important being to keep that data away from competitors or those looking to hurt the company. CII protections work to guard company interests.

2. WHO can access the protected data?

Locking away data certainly secures it, but the data serves very little purpose if need-to-know users cannot properly access it. This is where group access lists and Digital Rights Management (DRM) come in handy. Ensuring only true stakeholders have access minimizes the chances that private company information ends up in the wrong hands.

3. HOW can the protected data be accessed?

Policy creators must consider the following questions: Can the users only review the information, or can they also alter the information? Can they download the information locally? Administering user roles can help with this - certain users can read, other users can modify, and so on.

Implementing a sustainable information governance policy

Once an IG policy has been defined, it's up to those implementing it to choose workflow solutions that meet the requirements of the policy. Weighing the usability of these solutions against how closely they adhere to the IG policy can be a bit of a give and take. The more secure a solution is, the more complicated it might be to administer or the more difficult it might be to use productively.

One area where solutions can offer both information security and solution usability is document viewing. Both CCI and PII are often found in Microsoft Office documents. Think about a financial spreadsheet, an applicant resume, and a product design document. These three documents are from three different areas - finance, human resources, and product development - but all contain CCI and/or PII. Selecting solutions that allow for secure storage of these kinds of documents, while limiting the access to these documents only to those who need to see them, certainly supports any well-defined IG policy. And if these solutions also provide a consistent way to view and work within these documents, that's also a usability win.

On the other hand, solutions that store documents, but don't provide a way to view them, not only impact productivity, but may encourage violating the IG policy. For instance, consider a Microsoft Word document containing patent submission information saved securely within a product lifecycle management solution in the cloud. This information is safe - access to the document within the solution is limited. But what happens when someone with access wants to see the information?

They click on the file within the solution and instead of opening a viewer, a copy of the file is downloaded locally to their personal computer so they can open it. If this process is repeated by everyone who needs to access this document, that is a tremendous waste of time. But worse yet, there are now dozens of copies of this document and the information contained therein on different systems. Is the information still secure? What if someone prints the document? Or sends it to personal email or personal cloud storage? Now that there are dozens of digital duplicates, the chances of this information leaking are now a lot higher. This can be avoided with a single solution that not only stores data, but also manages access among users.

Considering solutions that support information governance

The fact is that every day, Microsoft Office files are shared by millions across all vertical industries and markets - and these files frequently contain sensitive data. Setting an IG policy that moves these kinds of documents to limited distribution within workflow tools is a start. But from there, organizations must consider how users are allowed to access the documents to further limit the number of copies of these files. These documents must also be viewable within the solution to prevent users downloading them or attempting to access them by any other means.

Workflow solution providers can feel confident their products meet customer expectations around protecting CCI and PPI by implementing an inline viewer like Qualcomm DirectOffice Document Conversion Software, which ensures that documents are quickly converted and accurately displayed right within the solution.

Check out Qualcomm DirectOffice to see for yourself how it works

Qualcomm, Wednesday, April 26, 2023, Press release picture

View additional multimedia and more ESG storytelling from Qualcomm on 3blmedia.com.

Contact Info:
Spokesperson: Qualcomm
Website: https://www.3blmedia.com/profiles/qualcomm
Email: info@3blmedia.com

SOURCE: Qualcomm



View source version on accesswire.com:
https://www.accesswire.com/751371/Your-Guide-to-Defining-an-Information-Governance-Policy

News Provided by ACCESSWIRE via QuoteMedia

QCOM
The Conversation (0)
cell phone lying on table with app icons floating above it

How to Invest in Mobile Apps (Updated 2024)

The ubiquity of mobile devices and their prominence in everyday life has led to the development of mobile apps for everything from gaming and dating to banking and stock trading.

Mobile apps began rising to prominence in 2007 with the launch of the iPhone, which heralded a new era in connectivity brought about by revolutionary touch technology. The field has grown widely from thereon out, and the diversity of today’s offerings makes investing in mobile apps an appealing prospect.

With about 2.87 million apps in Google’s (NASDAQ: GOOGL) Google Play Store and around 1.96 million apps available in Apple’s (NASDAQ:AAPL) App Store, there is no shortage of app choices for mobile devices.

Keep reading...Show less
Icons for various apps floating above a smartphone.

Social Media Stocks: 5 Biggest Companies

The world’s largest social media platforms have revolutionized the way people connect on the internet, and the companies behind these platforms can offer major investment opportunities.

This year's strong rally in technology stocks, led by Meta Platforms (NASDAQ:FB), is a clear example of the huge presence social media companies have in the stock market. In late April, shares of the social media giant jumped 14.6 percent on higher-than-expected earnings. The news came alongside increasing investor confidence in the broader tech industry.

“Meta earnings show the company’s commitment to cost discipline while driving accelerating N-T revenue growth and also continuing to invest in longer-term transformational technologies like artificial intelligence (AI) and the metaverse,” said Doug Anmuth, an analyst at JPMorgan Chase (NYSE:JPM).

Keep reading...Show less
BlackBerry Extends Partnership with Leading Managed Security Services Provider  to Ensure SMBs are Set Up for Cyber Success

BlackBerry Extends Partnership with Leading Managed Security Services Provider to Ensure SMBs are Set Up for Cyber Success

 
 

BlackBerry Limited (NYSE: BB; TSX: BB) and Solutions Granted today announced an extended partnership, naming the leading cybersecurity services provider a Master Managed Security Services Provider (MSSP), enabling it to better scale and meet the growing demand for cybersecurity services among small and medium-sized businesses (SMBs).

 
 

  BlackBerry Logo Black (PRNewsfoto/Blackberry Limited) 

 

"Solutions Granted has been honored as BlackBerry MSSP Partner of the Year for North America for five consecutive years and we're excited to take our partnership to the next level by crowning them as our top Master MSSP," said Adam Enterkin , Chief Revenue Officer, Americas, BlackBerry Cybersecurity. "BlackBerry is dedicated to increasing its focus on MSSP partners to ensure they're set up for success. Endpoints are proliferating, and so are the cyberattacks against them. Our extended partnership with Solutions Granted will help hundreds of small and mid-size businesses continuously adapt to an ever-changing threat landscape."

 

As a 'Master MSSP', Solutions Granted will be better positioned to help its own partners to deliver Managed Detection and Response (MDR) and other Managed Security Services to their mid-market and SMB clients.  In partnership with BlackBerry and heavily leveraging the Cylance® AI-powered portfolio, Solutions Granted helps thousands of clients secure their environments and prevent attacks. By working with Solutions Granted, MSSPs and managed service providers (MSPs) can offer industry leading managed security, without making the significant investment of building out their own security operations center (SOC).

 

  CylanceENDPOINT™ is among the solutions it helps managed service providers (MSPs) deploy to clients, either as individual managed services or integrated into a SOC-as-a-service offering.

 

"BlackBerry's support for our business model provides the flexibility we need to continue to meet customer demand and provide the best possible product support for their business needs," said Michael E. Crean , Chief Executive Officer, Solutions Granted. "We value the investment BlackBerry is making in our partnership and know this will go a long way in setting up our customers for success."

 

To learn more about BlackBerry MSSP Partners, visit blackberry.com/us/en/partners/mssp-partners .

 

  About BlackBerry  

 

 BlackBerry (NYSE: BB; TSX: BB) provides intelligent security software and services to enterprises and governments around the world.  The company secures more than 500M endpoints including over 215M vehicles.  Based in Waterloo, Ontario , the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety and data privacy solutions, and is a leader in the areas of endpoint management, endpoint security, encryption, and embedded systems.  BlackBerry's vision is clear - to secure a connected future you can trust.

 

 BlackBerry. Intelligent Security. Everywhere.

 

For more information, visit BlackBerry.com and follow @BlackBerry.

 

  Trademarks, including but not limited to BlackBerry and EMBLEM Design are the trademarks or registered trademarks of BlackBerry Limited, and the exclusive rights to such trademarks are expressly reserved.  All other trademarks are the property of their respective owners.  BlackBerry is not responsible for any third-party products or services.  

 

  About Solutions Granted Inc.  

 

Solutions Granted is a Master Managed Security Services Provider (Master MSSP). They offer cybersecurity solutions to North American MSPs and MSSPs and are committed to delivering solutions without requiring minimums, commitments, or long-term contracts. They proudly offer many security layers as well as a 24x7 U.S.-based Security Operations Center (SOC). Over the past several years, Solutions Granted has emerged as a clear leader in the channel, by winning countless awards including the CRN Security 100 list, Top 100 MSSP List, Top Global MSSP List, and BlackBerry MSSP Partner of the Year. Learn more at https://www.SolutionsGranted.com  

 

  Media Contacts:  

 

 BlackBerry Media Relations

 

+1 (519) 597-7273

 

  mediarelations@BlackBerry.com  

 
 
 

 Cision View original content to download multimedia: https://www.prnewswire.com/news-releases/blackberry-extends-partnership-with-leading-managed-security-services-provider-mssp-to-ensure-smbs-are-set-up-for-cyber-success-301803800.html  

 

SOURCE BlackBerry Limited

 
 

News Provided by PR Newswire via QuoteMedia

Keep reading...Show less
BlackBerry's Quarterly Threat Intelligence Report Finds Banks, Healthcare Providers and Food Retailers are Top Targets for Cybercrime

BlackBerry's Quarterly Threat Intelligence Report Finds Banks, Healthcare Providers and Food Retailers are Top Targets for Cybercrime

 
 

   Geopolitical unrest positions key industries as targets for state-sponsored actors and financially motivated attacks   

 

BlackBerry Limited (NYSE: BB; TSX: BB) today released its latest Quarterly Global Threat Intelligence Report highlighting an increase in cyberattacks directed at financial institutions, food retailers and healthcare providers, with 60 percent of all attacks targeting these three key industries.

 

News Provided by PR Newswire via QuoteMedia

Keep reading...Show less
person using credit card to pay for something on their phone

Mobile Investing in Australia

After lagging behind for a prolonged period, Australia's tech sector is ramping up at an accelerated pace. The tech sector is now equivalent to 8.5 percent of the country's GDP as of the end of 2021, an increase of 26 percent since the onset of COVID-19 through June 2021 and a massive 79 percent increase over the past five years. Tech contributes AU$167 billion to the Australian economy, trailing only the mining (AU$205 billion) and financial/insurance (AU$169 billion) sectors.

Australia's characteristically resilient economy — which had not experienced a recession in nearly 30 years prior to COVID-19 lockdowns — has provided a sturdy backdrop for its growing tech sector. The growth in the tech sector’s contribution to the GDP has outpaced average growth of other industries by more than 400 percent, a gain partly attributable to accelerated digital technology adoption during the pandemic.

This dramatic expansion is largely in response to Australia's need to catch up to the rest of the world and assert itself in the global tech marketplace. Should the tech sector continue to grow at its current rate it will eventually surpass the relative GDP contribution of the long dominant mining sector. This will also complete the process of bringing Australia more in line with other western economies such as the UK, and notably Canada, which is comparable to Australia in terms of its dominant mining and agricultural industries.

Keep reading...Show less
DGTL Holdings Completes Acquisition of Engagement Labs

DGTL Holdings Completes Acquisition of Engagement Labs

DGTL Holdings Inc. (TSXV: DGTL) (OTCQB: DGTHF) (WKN: A2QB0L) (FSE: D0G) ("DGTL Holdings") and Engagement Labs Inc. (TSXV: EL) ("Engagement Labs") are pleased to announce that DGTL has completed its previously announced acquisition of Engagement Labs by way of a plan of arrangement (the "Arrangement").

Transaction Details

News Provided by Newsfile via QuoteMedia

Keep reading...Show less

Latest Press Releases

Related News

×