The Rumsfeld Matrix as an effective tool in the decision-making process
During a briefing on the Iraq War, Donald Rumsfeld divided information into 4 categories: known known, known unknown, unknown known, unknown unknown. ...
On the one hand data promotes huge possibilities for business and on the other hand it demands a huge responsibility from the business. Effective data management system including data collection, storage, processing, accessibility, safety is a necessary part of every company. All system and every its process must be correctly configured and perform its functions to obtain maximum result.
There is no doubt that all data need to be protected, otherwise other business processes can become senseless. News about leak of different companies’ information is not rare. For example, in the result of Yahoo attack in 2013 were compromised 3B of clients’ identity details; Marriott attack involved 500 million consumers personal information; more recent problem – Sephora information leak.
Such situations have negative influence on the whole business space: both an injured business (stock price losses, a barrage of bad coverage, widespread business mistrust etc.) and business that has become a witness of this situation. The management of companies (specifically after the next leak news) is actively involved in cybersecurity issues. However, fear and knowledge lack generate mistaken opinion among management (for example, artificial intelligence technologies implementing ensures protection against cyber attacks).
But before technologies implementing into business processes, it is necessary to pay attention to the following points:
It is too often situation when one IT specialist plays several roles in the company (from maintaining work computers to ensuring the protection of confidential data). The IT department understaffing and insufficient training level entail negative consequences, including data security issues. There is not the right size of IT department. Its size should be such that all company’s requests are qualitatively satisfied.
Every business strives to maximize profit and minimize costs. The management is reluctant to agree to a new cost item of hiring cybersecurity specialists or training existing employees. Trying to save money a choice turns next to a cheaper option – low-quality decision acquisition, that endangers the entire business.
To choose an effective data protection method it is necessary to understand completely what data the company owns, what information is confidential, where it is processed etc. Without realizing it and chaotically buying data protection tools you may find that all these tools are not suitable for business needs. Money was spent without result.
The process of data management system selection and implementing don’t tolerate haste, «economy» and chaos. Organizing the IT department inside a company it is necessary to understand what functions IT specialists need to perform, what business needs must be met, what goals must be achieved. Only understanding this, it is possible to create effective department. Delegating tasks of data management system implementing to contractors it is important to make a well-considered decision. Trust your business to a responsible partner who helps to achieve goals and improve business performance.