Over the last several years, advances in computer and information system technologies, including “cloud” based data storage technologies, have significantly augmented a company’s ability to create, collect, store, process, maintain and distribute information and data (“Data Assets”).  Not only has the volume of data that can be collected and stored increased, the types of data and ways to measure and quantify that data have also multiplied as companies implement different tools and systems to gather information.  Drowning in this flood of data, businesses are struggling to determine what Data Assets to actually gather and maintain, and how to effectively analyze such Data Assets for meaningful results.  Unfortunately, together with these expanded capabilities to gather, process, and store Data Assets comes the increased likelihood that such data may be lost, stolen, or hacked, resulting in the misuse and exploitation of such data.

FULL ARTICLE