The Business-Technology Weave:

June, 2010


June 30, 2010  12:22 PM

A Challenge to Success and Culture: The Excuse Factory



Posted by: David Scott
business culture, IT culture, organizational culture, success culture

 

 

The opposite of a Success Culture is not necessarily an...

June 30, 2010  7:46 AM

Creating and Sustaining the Success Culture



Posted by: David Scott
business beliefs, business culture, business mission, business standards, business values, IT culture, organizational culture, success culture, the business-technology weave

 

How do we create a success culture?  How do we sustain the successful organization and make it ever more...


June 28, 2010  3:46 PM

Critical Need: The Success Culture



Posted by: David Scott
business attitude, the business-technology weave

 

It is no use saying, "We are doing our best."  You have got to succeed in doing what is...


June 24, 2010  1:49 PM

Enterprise IT: Users Re-define “Workaround” in Using Unsupported and Disallowed Devices, Apps



Posted by: David Scott
acceptable use policy, business security, cisco, disaster recovery, InsightExpress, IT security, security policy

 On June 24th, Cisco released survey results regarding use of social networking sites and the use of personal devices in the workplace.  (Conducted by InsightExpress).

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 23, 2010  11:57 AM

Security: Small and Medium Business (SMB) – Late to the Party?



Posted by: David Scott
2010 Global SMB Information Protection Survey, business security, IT security, medium business, security policy, small and medium business, small business, SMB, SMBs, symantec press release

  

Symantec Corporation has released a very interesting (annual) survey, the 2010 Global SMB Information Protection...


June 20, 2010  1:24 PM

Social Networking and the Workplace



Posted by: David Scott
acceptable use policy, bebo, business security, business-technology weave, content management, facebook, friendster, hi5, IT security, myspace, social networking, social networks

  Increasingly I see articles about “young” employees lobbying managers and senior executives about using social networking sites for work-related activity. These sites generally comprise (perhaps compromise?) a mash of party pics, all manner of stream-of-consciousness...


June 17, 2010  3:02 PM

EMP: Electro-Magnetic Pulse – A Reasoned Discourse for DAPR’s Replacement of Standard DR Policies



Posted by: David Scott
BP oil spill, business recovery, DAPR, disaster awareness preparedness and recovery, disaster recovery, electro-magnetic pulse, emp, gulf oil spill, IDRU, risk management

We’ve touched on the disaster of what’s happening in the Gulf of Mexico and with the ongoing tragedy of BP’s oil spill. We can understand that technology is enabling: For both good and ill.

On a smaller scale, many local...


June 14, 2010  9:57 AM

Understanding IDRU (Inadequacy, Disaster, Runaway and Unrecoverability) in contrasting Disaster Recovery (DR) vs. Disaster Awareness, Preparedness and Recovery (DAPR)



Posted by: David Scott
BP gulf oil spill, DAPR, disaster recovery, DR, IDRU

In our last discussion, we talked about new scales of harm – weighted outcomes that are so great, as delivered by disaster, that holding them in abeyance ...


June 10, 2010  6:35 AM

BP and the Gulf Oil Spill: Lessons for IT and Business.



Posted by: David Scott
BP gulf oil spill, BP oil spill, business continuity, contingency plans, DAPR, disaster recovery, gulf oil spill, IDRU, IT plans, IT policy, risk analysis

 

Let’s examine new scales of risk, weighted outcomes, and what must be done in the face of...


June 7, 2010  4:50 AM

Business Continuity and Data Breach; hardly mutually exclusive, and yet…



Posted by: David Scott
business continuity, business risk, contingency planning, contingency plans, data breach, disaster planning, disaster prevention, disaster recovery, risk management

 

According to a recent survey by BDO, “Business Continuity” ranks higher as a security concern than “Data Breach”...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: