Disclosed are systems and/or methods that mitigate overexposure of shared content and that facilitate improving security of content in a computing environment. In particular, the systems and methods involves monitoring resource activities such as user interactions (between users and/or between users and resources), email activity, share space activity, shared content activity, distribution lists, contact lists, personnel or organization structures, and the like. Data can be collected as one or more resource activities are monitored and then analyzed to determine where, if any, changes have taken place. For example, if a user has been removed from a distribution list or a user has not accessed the shared content within a time period, a recommendation can be formulated to suggest an adjustment to the affected access rights. Furthermore, the systems and/or methods can be integrated with other applications such as an email client, whereby an out-of-office indicator can leave access rights as they are.