Doculabs Blog

Six Information Security Trends in 2019: Focus on Government, Cloud, eDiscovery, Reputational Risk, Big Data and Artificial Intelligence

The last two years have been pretty rough on organizations when it comes to information security. As a result of last year’s very large, visible breaches—and the year-long focus on GDPR—chief... […]

7 Types of Enterprise Risk from a Poorly Managed Application Portfolio

The risk from inadequate application portfolio management is significant and too often overlooked or ignored. In this post we present seven types of enterprise risk from a poorly managed application... […]

How Information Governance Improves Patient Outcomes

In Part 1 of this two-part series, Benefits of Information Governance in Healthcare, I focused on how healthcare providers can manage, and thus protect, patient information. Part two presented here... […]

Case Study: Strategy for Improved Data Governance

Doculabs helps healthcare insurance provider improve the security of its sensitive, high-risk data by developing an Enterprise Data Retention Governance and Archiving Program to be implemented across... […]

Case Study: Content Cleanup - a Prerequisite for Office 365 Migration

Organizations present different priorities for cleaning up their content repositories. In this case study, content cleanup became a prerequisite for Office 365 migration for a power company that... […]

Benefits of Information Governance in Healthcare

The threat from hackers, along with other cyber security threats, can compromise consumer, patient and other critical data. Healthcare, like every sector of our economy, has been under pressure to... […]

Office 365 Is Becoming a Complete Enterprise Content Management Solution

A version of this post originally appeared in my CMSWire column. […]

How To Prioritize Sensitive Data Is a Business Decision

I was working with a financial services client recently, and had an interesting discussion about how and when to prioritize sensitive data in its information lifecycle governance (ILG) program. How... […]

Take Our Survey: Does Your Privacy Compliance Program Measure Up?

Over the past year, the number of privacy breaches has just kept growing. What are you doing to protect your customers’ (and employees’) privacy, especially in light of compliance regulations such as... […]

Data in the Testing and Development Environment—An Overlooked Information Security Risk

The testing and development environments are an overlooked information security risk. When it comes to information management and governance, we tend to focus instead on business production... […]