Arthur Hedge is the President of Castle Ventures LLC, an Information Security consulting firm. Arthur is active on several AIIM standards committees and is on the board of the AIIM Garden State Chapter.
Arthur is a member of OWASP, ISSA, and a Certified Information Systems Security Professional.
8 Information Management Security Predictions for 2010
1 -- Someone will develop an alternative to the PDF file.
With all of the security issues that have plagued the Adobe PDF format due to its use of JavaScript, someone will come up with a new, safer, long-lasting document format.
2 -- To improve security companies will increase the use of cloud-based document storage.
For many small and mid-size organizations the promise of a more secure facility offered by cloud service providers will drive them to increase the use of third party solutions for document storage. This will be driven the by the economies of scale that the cloud providers can generate.
3 -- To improve security some companies will avoid cloud storage.
Yes, this seems like a contradiction to the previous prediction, but larger organizations will react differently to cloud computing. There are two key drivers. First, as the clouds grow in importance they will become more of a target. Researchers at UC, San Diego and MIT have already demonstrated a theoretical attack on the Amazon infrastructure. Secondly, litigation fears will increase. For example, Google is repeatedly subpoenaed for information. A cloud provider is far less likely to go to the mat to defend the privacy of documents than the organization that owns them. Some organizations, especially large multinationals, will be afraid to keep documents in an environment where a government can get access to that information via the simple threat of a subpoena.
4 -- Hacked email scandals will increase.
Hackers tend to be copycats. In light of all of the publicity generated by the theft and release of the emails in “Climategate” scandal involving the Climate Research Unit at the University of East Anglia, the hacker community will increase its efforts to breach other politically sensitive organizations. As that makes news a vicious cycle of attacks will begin.
5 -- The cyber security czar will not directly affect the enterprise content management (ECM) market.
In December of 2009, President Obama named Howard Schmidt as the White House cyber security coordinator. My guess is that his focus will be on big-picture threats to the United States that will not drive any changes in the short run to the ECM market.
6 -- State privacy regulations will drive security efforts in the ECM space.
The Commonwealth of Massachusetts’s regulations on personal information go into effect on March 1, 2010. This will lead to other states following suit and the requirements for businesses to better protect personal information will continue to increase.
7 -- A celebrity will have their Electronic Medical Records hacked.
With the drive to move more and more medical records into an electronic format, the temptations for rogue computer users to access patient information illegally will grow, leading to a high profile release of a celebrity’s medical history.
8 -- Document integrity will grow in importance.
With the increasing publicity shed on breaches, someone in 2010 will release documents that are forged.
-----
Some other posts worth considering...
- 8 things you need to know about information risk
- 8 things you need to know to build an ECM strategy
- 8 things you need to know about developing an ECM information architecture
- 8 things that changed the history of document management
- 8 things you need to know to manage the explosion of information
- 8 things you need to know about workflow and business process engineering
- 8 things small businesses need to know about document management
- 8 things you need to know about using ECM for regulatory compliance
Recent Comments