Just the other day it was freezing here in Canada – the kind of chill where you can see your breath in front of you. Today, it was 18 degrees celcius, the sun was shining and the first signs of early Spring were evident. Shedding the weight of winter jackets and boots, there’s a clarity in the feeling and an uplifting for sure.
I believe I can compare that feeling to the relief felt by organizations who successfully secure their PII (stay with me here), who implement measures to identify and interrogate content resulting in a clarity of knowledge about their enterprise library. Addressing the risk of PII can be all-consuming and can become all you can see – similar to a cold winter’s breath. Once that weight is lifted, that stress is shed, content is exposed for what it is, organizations can run, not trudge.
Who doesn’t want that feeling?!
Sometimes what draws attention to a need to address the management of content as a whole is a negative event, like the exposure of PII. This risk is real of course and very public in many cases. In fact there were 1.4 million records breached in the US in the first quarter of 2016, resulting in a 48 million dollar impact on the US economy. So it’s a problem. However, there’s usually a bigger problem behind it.
Recently we’ve been working with customers that need to get a handle on Personally Identifiable Information (PII). A newsworthy topic, PII has exposed enterprises to risk and public unravelling. While it’s touted as a security risk, traditional security measures don’t usually address the real problem. With 70% or more of data breaches being internal, it’s not good enough to beef up your firewall. Employees share information (particularly “unstructured” information like Word documents, social media, CAD diagrams, emails and more) inside and outside of the company so putting a bigger fence around your data doesn’t work. That’s the reality.
Organizations turn to Adlib because company leadership is often concerned with not only identifying PII and securing it, but implementing a system to help them identify, redact, classify, and store unstructured content, including PII, on an ongoing basis. Accomplishing this with one approach, one vendor, is a huge advantage.
That approach takes a holistic view of each piece of content: ingestion it properly, extracting data of value from it, classifying it (and bucketing PII appropriately during the process) and archiving it for the long term. Throughout this process companies can ensure that their assets are protected and future-proofed
Knowing what you have is a powerful thing. By identifying and examining content with an automated process, organizations can breathe a sigh of relief and feel confident that sensitive information is protected and content can be leveraged to aid better decision making.