Five Tips for Easier Data Governance

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Five Tips for Easier Data Governance-1 Next

Click through for five steps you can take to ease the trauma associated with data governance.

Recently, Loraine Lawson wrote why she believes data governance is key to self-serve IT. But to be honest, she says she can see why you'd be tempted to procrastinate on data governance. It sounds intimidating. "Governance" conjures up all kinds of images, from guys in white wigs using Old English pronouns, to a room full of exhausted business people debating data minutiae ala "12 Angry Men."

Data or information governance — the difference seems to be that information governance focuses more on legal compliance — may not involve balloons and cupcakes, but it doesn’t have to be a punishing ordeal, either. Here are five steps you can take to ease the trauma of starting data governance.

More Slideshows:

Password Misuse Could be the Root Cause of Hacking SpikePassword chaos amongst IT staff and apathy about password security amongst their senior management is creating a security nightmare.

The Six Dumbest Hacks of All Time While hackers can be dangerous, not every hacker is a Kevin Mitnick.

Seven Tips to Protect Your Google WalletEven with Google Wallet's built-in identity theft protections, you still need to be wary of hackers.


Related Topics : Application Security, IT Process Management, Six Sigma

More Slideshows

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.