"When the bad guys break into our computer networks – which they are doing with terrifying regularity – they are not doing it to steal billions and billions of meaningless digital characters. Data, by itself, is useless to them. They are breaking into our networks to steal data in context. They are stealing the owner’s most valuable asset: their information." My latest #NextGenRM blog post: https://urldefense.proofpoint.com/v2/url?u=http-3A__bit.ly_2CrB9kE&d=DwIFaQ&c=pZJPUDQ3SB9JplYbifm4nt2lEVG5pWx2KikqINpWlZM&r=b5NZPQUb9_r2rQ3Zd74ATT3aSs9yKyRnJLOhqJvd7fE&m=g4ejKs_PRtpIulWXd0SGeOB0FyqE8GuuwaelSZto8cQ&s=AZ79bzaI64dIFpIxXNeB1llG8g3_vb0Ex8c9qRLsDcw&e= As always, comments and questions are appreciated. Don Lueders, CRM, CDIA Chantilly, VA [log in to unmask] List archives at http://lists.ufl.edu/archives/recmgmt-l.html Contact [log in to unmask] for assistance To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message. mailto:[log in to unmask]