Read All Posts »
Legacy-data

A myriad of articles have been written about ‘Big Data’ – the exabytes of electronic information that is created daily, along with the rush of ever-changing technology.   This proliferation of electronically stored information (ESI) has caused a radical shift in information governance strategies that address how data is processed, categorized and stored.  Less newsworthy, but just as important, is Big Data’s older cousin legacy […]

Handle Social Media Content - Sherpa Software

Social media represents one of the fastest growing segments of workplace communications. As sites like Facebook, Twitter and others become integrated in the day-to-day operations of a company, so too do those companies experience an increased risk. The radical transparency and expansive reach of social media can be a great tool to interact with people; […]

Visual-Data

Before you can develop a clear, effective information governance strategy, you need to understand the environment where your data resides and then clarify the requirements and goals of your organization. The best way to accomplish this is with effective analysis of your electronically stored information (ESI). Once you have control and an understanding of your […]

OTT-Disney-Fall-Vacation

Didn’t have the time off from work for a summer vacation? Scared that the crowds would be too much for the family, especially while trying to fight through it in 90-some degree weather in a humid place like Orlando? I hear your pain, and I echo your concerns. As a former employee of Walt Disney […]

Exchange 2007 was a watershed release for Microsoft’s messaging platform. Along with several new architectural features, it introduced governance capabilities in the form of Messaging Records Management (MRM). MRM was an ideal solution for many organizations that required formal oversight of their email content. By deploying managed folders, administrators could craft custom retention rules that […]

File Management | Sherpa Software Blog

Emails are by far the primary target for companies performing retention policies and/or eDiscovery; in fact, many companies don’t consider other types of data when these topics are discussed. Not yet anyway.  But all companies need to be aware that emails are not their only IT risk; attachments must also be considered. Attachments within messages […]