This resource is no longer available
10 Things IT Should Be Doing (but isn't)
There are, of course, best practices that when repeated often and consistently can ensure nearly optimum mapping of users to data since least-privilege access can significantly reduce the risk of data loss. However, for most organizations following unstructured data protection "musts" is very challenging because the data is being generated far too quickly, so even if the organization is small the data it creates and preserves can quickly outpace the IT department's ability to keep up with protections and access control lists. Nevertheless, here are the ten must-do actions for maximizing unstructured data protection.