I think the Sony breach is an excellent example of the need for information governance not just RIM the most shocking thing to me was putting all the passwords in a folder labeled ---- PASSWORDS On Thu, Dec 18, 2014 at 7:42 AM, Gary Link <[log in to unmask]> wrote: > > > Can anyone identify any additional elements of the Sony breach that are > good examples of how RIM (as opposed to pure cyber security measures) can > help protect an organization's private data and files? > > -- Peter Kurilecz CRM CA IGP [log in to unmask] Dallas, Texas Save our in-boxes! http://emailcharter.org http://twitter.com/RAINbyte http://tech.groups.yahoo.com/group/RAINbyte/ http://paper.li/RAINbyte/rainbyte https://groups.google.com/d/forum/archives-in-the-news http://pinterest.com/pakurilecz/archives/ http://pinterest.com/pakurilecz/records-management/ http://www.linkedin.com/in/peterakurilecz #*CantbeworsethanPeterk* <https://twitter.com/hashtag/CantbeworsethanPeterk?src=hash> Information not relevant for my reply has been deleted to reduce the electronic footprint and to save the sanity of digest subscribers List archives at http://lists.ufl.edu/archives/recmgmt-l.html Contact [log in to unmask] for assistance To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message. mailto:[log in to unmask]