The Business-Technology Weave:

June, 2011


June 27, 2011  7:45 AM

Social Intelligence, Part II



Posted by: David Scott
Add new tag, internet security, interviewing, job search, job searching, online identity, online reputation, online security, online wellness, personal security, reputation.com, social intelligence, social intelligence corporation, social network security, social networking

 

Today’s article follows on to yesterday’s

June 25, 2011  8:11 AM

Social Intelligence



Posted by: David Scott
acceptable use, content management, employee security, Federal Trade Commission, SIC, social intelligence, social intelligence corporation, social networking, social networking peril

 

We’ve discussed online social networking peril here at length, but there...


June 24, 2011  7:47 AM

UK, France and Germany: 84% of companies have suffered breach in the past year



Posted by: David Scott
business continuity, business security, data breach, data recovery, IT security, Juniper, Juniper Networks, Juniper Networks Survey, Security Plan, security policy

 

From Europe comes incredible news, as reported by Juniper...


June 21, 2011  9:13 AM

The Real Heart of Security: Employee Awareness Program(s)



Posted by: David Scott
acceptable use, allowable use, awareness program, best IT practice, best practice, business continuity, business security, content management, data breach, data security, e-mail policy, eCulture, eDiscovery, employee awareness, internet use, IT security, security prism

 

Today, employee error and otherwise casual approaches to security is causing...


June 18, 2011  10:33 AM

Duty has No Room for Conceit



Posted by: David Scott
best practice, business and IT, business plans, business policies, business policy, business survey, IT budget, IT burden, IT plans, IT policies, IT policy


June 17, 2011  12:05 PM

Security, Privacy, Your Organization… and YOU



Posted by: David Scott
best security practice, business continuity, business exposure, business liability, content management, content security, cost of data breach, cyber attack, cyber security, cybersecurity, data breach, data breach expense, data exposure, data privacy, disaster awareness, disaster awareness preparedness and recovery, disaster plan, disaster prevention, Executive Director, information privacy, International Association of Privacy Professionals, security officer, Trevor Hughes, workplace privacy

 

I was reading an interesting article the other day,


June 16, 2011  9:33 AM

Citigroup Breach Now Up to 360,000: New details of almost unbelievable lapse



Posted by: David Scott
bank breach, breach protection, breach recovery, browser vulnerability, citi breach, citi group, citi group breach, citigroup, CitiGroup breach, credit card breach, credit card hack, data breach, data hacking, data protection, hackers access data, hacking bank account, hacking data, internet security, security flaw, URL vulnerabilities, URL vulnerability

 

I don’t mean to beat up on Citigroup.  But there’s an...


June 13, 2011  10:32 AM

Breach, Meet Citi Group



Posted by: David Scott
breach notification, citi, citi breach, citi group, citigroup, credit card breach, data breach

 
Of all the breaches I’ve noted here, this breach is really bad.  Reason?   I’ve got a Citi card.


June 12, 2011  11:16 AM

From Starbucks to U.S. Airways – Part II



Posted by: David Scott
data breach, data corruption, data loss, data processing center, planes grounded, power loss, Starbucks, u.s. airways, u.s. airways computer crash, UPS

 

And now for something (not) completely...


June 11, 2011  11:57 AM

From Starbucks to U.S. Airways – Part I



Posted by: David Scott
data breach, data corruption, data loss, data processing center, planes grounded, power loss, Starbucks, u.s. airways, u.s. airways computer crash, UPS

 

A few days ago my local Starbucks lost power.  The sun was...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: