Print

Print


"When the bad guys break into our computer networks – which they are doing with terrifying regularity – they are not doing it to steal billions and billions of meaningless digital characters. Data, by itself, is useless to them.  They are breaking into our networks to steal data in context.  They are stealing the owner’s most valuable asset: their information." 

My latest #NextGenRM blog post: https://urldefense.proofpoint.com/v2/url?u=http-3A__bit.ly_2CrB9kE&d=DwIFaQ&c=pZJPUDQ3SB9JplYbifm4nt2lEVG5pWx2KikqINpWlZM&r=b5NZPQUb9_r2rQ3Zd74ATT3aSs9yKyRnJLOhqJvd7fE&m=g4ejKs_PRtpIulWXd0SGeOB0FyqE8GuuwaelSZto8cQ&s=AZ79bzaI64dIFpIxXNeB1llG8g3_vb0Ex8c9qRLsDcw&e= 

As always, comments and questions are appreciated.

Don Lueders, CRM, CDIA
Chantilly, VA
[log in to unmask] 

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]