Cyber Hoarders - Part 2

In my previous blog I admitted to being a “Cyber Hoarder.”  I am guilty of have multiple copies of the same files on my computer.  I saved multiple email attachments on my computer.  Not only do I have Outlook PST’s saved on my computer, but I also have Outlook PST’s saved on my Window’s home directory.  It’s the first step in dealing with a problem – admit that you have one.  I am not alone. Multiply my “Cyber Hording” behavior among tens, hundreds, or even thousands of users and it does not take long for the storage resources to shrink.  Compound the problem with corporate compliance and mandates governing document and data retention periods, and we can see that the solution to this problem is not a simple matter of hitting the delete button. So we have identified and admitted to the problem.  Now, let’s approach addressing it.  One of the first tasks we need to do when taking on a “Cyber Hoarding” issue is to identify the extent of the problem.  This involves coming up with a process of what is allowed and not allowed when it comes to storing information.  This may seem trivial or very tedious depending on the levels of detail but this effort will reap great rewards when it comes to putting into place technologies and practices to address the “Cyber Hoarding” issue.  From these policies and procedures a comprehensive inventory should take place of the “who, what, when, where, and how” of the documents stored.  We should understand who has ownership of the information/documents (who are the Cyber Hoarders?), what type of information/documents exist (business documents or personal mp3’s), where are these documents being stored (expensive primary storage on the SAN), and how the information/documents are being stored (open storage, no quotas, just drop it here).  Now that we have laid the frame work for dealing with our “Cyber Hoarder” issues, I will discuss technologies that can begin the healing process. For a quite amuzing video depiction of “Cyber Hording”, check out this video: http://www.symantec.com/tv/allvideos/details.jsp?vid=62714857001