Join Robert Smallwood for an in-depth discussion in this video Mobile, part of Introduction to Information Governance.
- [Voiceover] Information Governance for Mobile Devices.…Most mobile devices aren't designed with security in mind.…Smartphone virus infections are harder to detect…than most PC or laptop infections,…and users may be unaware they're being monitored.…What's the most common method for hackers…to get into your information?…To fool you into thinking that they are a co-worker…or to fool you into thinking that…someone that you love is in distress,…and they'll use that kind of phishing technique…to be able to get at your private data.…
Some security or vulnerability…countermeasures you can deploy.…Train your users on possible threats and new schemes.…Whenever a new scheme comes to light, update your training.…And training is a big part of your…overall information governance effort.…Now we'll move to mobile device management,…which is a type of software called MDM,…and you can deploy all the capabilities…to protect your information assets…through mobile device management.…Mobile device management software improves security…
Information governance (IG) helps organizations minimize information risks and costs while maximizing its value. IG is about security, control, and optimization of information. Learn the basic tenets of the emerging field of IG, beginning with definitions and concepts. Robert Smallwood explains the basics of IG and identifies key areas where an IG program will make a difference. He shares proven strategies, methods, and best practices for ensuring the ongoing success of your IG program.
- The definition of information governance
- The principles and best practices of information governance
- Why invest in information governance?
- The three-part IG framework
- Policies for email, social media, mobile, and cloud computing