Doculabs Blog

Jim Polka

Jim Polka
I’m a Principal Consultant. My expertise is in security-based information management and strategic deployment of ECM technologies.

Fixing the Marketing Content Lifecycle: Part 2 - Address the Challenges

In Part 1 of this two-part series, I reviewed many of the challenges that organizations (particularly financial services firms) face regarding how they manage content associated with their marketing... […]

Fixing the Marketing Content Lifecycle: Part 1 - Understand the Challenges

I’ve been looking at how organizations in the financial services sector can improve their marketing content lifecycle, (how they create, manage, and deploy their marketing content, and how they... […]

Blockchain and Information Governance

Blockchain has been the one of the hottest new technologies of the past couple of years. It’s important to remember that working with blockchain has important repercussions when it comes to... […]

How to Make It Easier to Comply with GDPR

One of the most frequent questions I’ve been getting from clients recently is around the European Union’s Global Data Protection Regulation (GDPR), which goes into effect on May 25, 2018. […]

Records Retention and Sensitive Data Identification

When it comes to your organization’s information security, risk surface is a critical factor. The less data available for bad actors to find and pilfer, the lower the risk to the organization. […]

Using Information Management to Improve Information Security: Lead by Example

Recently, I’ve seen too many instances where an organization’s corporate culture runs counter to the goals its corporate leadership have defined for how information is to be managed. It’s a case of... […]

Minimizing the Risk Surface of Unstructured Content for InfoSec: Content Migration

As I mentioned in my previous posts on Security and Access Remediation and Content Cleanup and Disposition, I’ve had a lot of clients recently start to undertake various projects to address the risk... […]

Minimizing the Risk Surface of Unstructured Content for Information Security: Content Cleanup and Disposition

As I mentioned in my previous post on Security and Access Remediation, I’ve had a lot of clients recently start to undertake various projects to address the risk presented by their unsecured... […]

How to Minimize the Risk Surface of Unstructured Content for Information Security: Security and Access Remediation

Recently I’ve had quite a few clients undertake projects to address the risk presented by their unsecured unstructured content. That unstructured content includes the usual suspects: Microsoft Word... […]

Don’t Just Lock Up the Family Jewels

AIIM recently released a report, “Data Privacy: Living by New Rules,” which found that 26 percent of the organizations it surveyed had suffered loss or exposure of customer data in the preceding 12... […]