{"id":4468,"date":"2015-03-25T14:03:32","date_gmt":"2015-03-25T19:03:32","guid":{"rendered":"http:\/\/www.encoretechresources.com\/insights\/?p=4468"},"modified":"2015-03-25T14:09:21","modified_gmt":"2015-03-25T19:09:21","slug":"mischief-lurks-increasingly-amidst-the-data","status":"publish","type":"post","link":"http:\/\/www.encoretechresources.com\/insights\/2015\/03\/25\/mischief-lurks-increasingly-amidst-the-data\/","title":{"rendered":"Mischief Lurks Amidst the Data"},"content":{"rendered":"<p><a href=\"http:\/\/www.encoretechresources.com\/insights\/wp-content\/uploads\/images6.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.encoretechresources.com\/insights\/wp-content\/uploads\/images6.jpg\" alt=\"images\" width=\"225\" height=\"225\" class=\"alignnone size-full wp-image-4474\" srcset=\"http:\/\/www.encoretechresources.com\/insights\/wp-content\/uploads\/images6.jpg 225w, http:\/\/www.encoretechresources.com\/insights\/wp-content\/uploads\/images6-150x150.jpg 150w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/a><br \/>\nWow, the sheer scale and density of information on the Internet, not to mention corporate  computer networks apart from the web, is becoming mind-boggling, and a growing opportunity for cyber mischief, intentional or by happenstance. Technical writers need to pay heed to what&#8217;s going on around them in this regard.<\/p>\n<p>Mark Schaefer in his engrossing new book, <em>The Content Code<\/em>, discusses &#8220;content shock,&#8221; and points to &#8220;a 500 percent estimated increase in the amount of information on  the web between 2015 and 2020. If you can imagine the vastness of the web today&#8230;well, pretty soon we&#8217;re going to have five times that! And some think that number is low, projecting as much as a staggering 1,000 percent increase in information density in that timeframe!&#8221;<\/p>\n<p>Schaefer adds that 75 percent of this information increase will be coming not from automated sensors in homes and on highways, the long-anticipated Internet of Things, but from brands and individuals. &#8220;Nearly every person on earth is becoming his or her own personal broadcast channel,&#8221; he advises.<\/p>\n<p>So what is a conscientious technical writer to do in the face of an information tsunami? Simply shrug it off and continue adding his or her own rivulets? Partly that, of course \u2013 completed pages, assignments and newly authorized documents prompt paychecks.<\/p>\n<p>Yet from within the deluge promptings toward order, economy and clarity of expression would seem to be increasingly advisable. Sanity, not to mention safety, comes in providing reliable guidance and making such output as accessible as possible to its intended consumers.<\/p>\n<p>But still, the mass of data available on local servers is an invitation to mischief or, to be less discreet, prying and spying. Chris LaPoint, Vice President of Product Management at SolarWinds, <a href=\"http:\/\/blogs.dlt.com\/strategies-fighting-growing-issue-insider-threats\/\">writes on the Technically Speaking blog<\/a> that &#8220;insiders are starting to supplant external hackers and terrorists as the greatest cybersecurity threat.&#8221; In a SolarWinds survey of federal IT pros, &#8220;more than half (53%) of the respondents identified careless and untrained insiders as the greatest source of IT security threats at their agencies, up from 42 percent last year.&#8221;<\/p>\n<p>So, it would seem that a responsible technical writer needs to be attuned not only to his own computer screen and keyboard, but to what is occurring around him as he pursues his work. <\/p>\n<p>Mischief might not always be intentional, sometimes it&#8217;s the result of sheer sloppiness. Along with the increasing volume of network traffic, &#8220;the growing use of personal devices is another factor, as is mounting pressure for IT pros to change network configurations <em>quickly<\/em>, rather than <em>correctly<\/em>. Combine these issues with simple human error \u2013 a misplaced USB drive here, an unattended laptop there \u2013 and lack of training, and one can understand how insider threats can loom so large.&#8221;<\/p>\n<p>It&#8217;s no longer that growing amounts of internally generated information are merely unwieldy, they may also be hard to safeguard, that is, to police. Let conscientious technical writers be mindful of that. \u2013 <em>Doug Bedell<\/em><\/p>\n<p><em>Photo \u2013 <a href=\"http:\/\/www.zazzle.com\">zazzle.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wow, the sheer scale and density of information on the Internet, not to mention corporate computer networks apart from the web, is becoming mind-boggling, and a growing opportunity for cyber mischief, intentional or by happenstance. Technical writers need to pay heed to what&#8217;s going on around them in this regard. Mark Schaefer in his engrossing [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,3],"tags":[],"class_list":["post-4468","post","type-post","status-publish","format-standard","hentry","category-business","category-technology"],"aioseo_notices":[],"_links":{"self":[{"href":"http:\/\/www.encoretechresources.com\/insights\/wp-json\/wp\/v2\/posts\/4468"}],"collection":[{"href":"http:\/\/www.encoretechresources.com\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.encoretechresources.com\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.encoretechresources.com\/insights\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"http:\/\/www.encoretechresources.com\/insights\/wp-json\/wp\/v2\/comments?post=4468"}],"version-history":[{"count":12,"href":"http:\/\/www.encoretechresources.com\/insights\/wp-json\/wp\/v2\/posts\/4468\/revisions"}],"predecessor-version":[{"id":4482,"href":"http:\/\/www.encoretechresources.com\/insights\/wp-json\/wp\/v2\/posts\/4468\/revisions\/4482"}],"wp:attachment":[{"href":"http:\/\/www.encoretechresources.com\/insights\/wp-json\/wp\/v2\/media?parent=4468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.encoretechresources.com\/insights\/wp-json\/wp\/v2\/categories?post=4468"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.encoretechresources.com\/insights\/wp-json\/wp\/v2\/tags?post=4468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}