Going forward, all businesses will need to ensure that they adequately account for each of the “four cornerstones” of business information management in their planning and strategy. By building a strategy that satisfies these broad business requirements, a company will be effectively managing business information while also mitigating risk and controlling internal costs. These cornerstones include: protecting business information; delivering data and documents in a secure manner; collaborating with a distributed workforce and client base; and controlling access to critical business information.Protecting business information can take many forms. One of the most critical forms of protection that is often overlooked by small and medium sized businesses is “business continuity.” Business continuity can be as simple as making sure workers always have access to key documents and data files. Sound practices will include keeping copies in a secure offsite location. Often overlooked as well is the need to take humans out of the mix. People often have the best intentions when it comes to backing up data files but have the worse habits. The result is the potential loss of months or years of information because an individual did not take the time to manually save files to an external drive or move them to a central file server regularly.
Protecting information can also take the form of a “corporate library.” Our public libraries are the keepers of information in our society. The sheer number of companies that don’t have a solid, chronologically managed corporate record of their activities is astounding. This type of corporate library will serve as a collective corporate memory since employees come and go. The libraries’ existence can ensure an easy transition to new management teams from the executive to the departmental level. Corporate libraries must have robust search and retrieval mechanisms and should be easily accessible from remote locations.
The need to deliver corporate information in a secure manner has always been important, but it is becoming a legal necessity in many industries. This is especially true in those industries where the management of personal data is involved. The ability to create secure sites on-the-fly so that workers can deliver information securely when they need to is paramount. More importantly, the ability to seamlessly create a virtual work environment that includes different types of people (employees, supervisors, clients, vendors, etc.) will increase command and control through improved transparency while keeping infrastructure costs under control.
The social networking phenomenon has turned the way businesses market themselves to the public upside down. As social networks such as Facebook have become more popular, businesses see these open networks as channel opportunities to build their brands and sell their products. This networking practice can be easily applied to business applications outside of the marketing departments as well.
Unlike typical “open” social networks, a “closed” business network will apply the same technology to a more limited group of users in a more targeted way. In other words, businesses can create a social network in order to interact for a purpose other than networking. This takes collaboration to the next level. There are many collaboration tools today that will support document sharing or task management. But very few that allow a user group to create a closed network designed specifically to move a business initiative forward. Project management software comes closest in that they all have robust task management, the ability to link documents to project initiatives, calendaring, etc. However, all the features are really designed for IT project managers, resource managers or for building reports for stakeholders. These are not truly collaborative systems in the way that a closed social network could be for business.
Key features of a closed social network would include: calendaring functions that integrate with desktop applications; the ability to invite and disinvite members quickly as necessary to share information and roles change; the ability to integrate with outside content or link to other business applications; the ability to control access to key information and distribute information quickly to a widely distributed group simultaneously, etc.
Controlling access to information is all important and can either take the form of broadcasting information to a desired audience or preventing a subset of an audience from gaining access to information. Ensuring that gatekeepers have adequate command and control of documents and data will become even more important than it is today. For those businesses that do not have a business intelligence program in place already, implementing technology that offers command and control features will offer an opportunity to decide who gets to have access to what competitive information and can go a long way towards simplifying the dissemination of critical information to clients and workers alike.
