The Business-Technology Weave:

July, 2011


July 31, 2011  9:45 AM

Frankensteins, Pt. III – A Simple Assessment to Setting Structure



Posted by: David Scott
best business practice, best IT practice, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business practice, IT department, IT positions

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend

July 30, 2011  6:23 AM

Frankensteins, Pt. II – Track Emerging Practices and New Areas of Support



Posted by: David Scott
business environment, IT discipline, IT job descriptions, IT position descriptions, IT staffing, SMB

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 30, 2011  6:01 AM

Frankensteins, Pt. I – Expensive to Maintain, Hard to Dismantle



Posted by: David Scott
business management, business stakeholder, IT jobs, IT positions, IT stakeholder, job description

 


July 26, 2011  10:09 AM

Social Networking: Sense and Sobriety



Posted by: David Scott
acceptable use, communications policy, content management, risk analysis, security policy, social networking, social networking and criminal, social networking and vacation, social networking crime, social networking liability, social networking security, survey for risk

 

Today’s social networking environment is interesting from a variety of...


July 20, 2011  10:46 AM

The Cloud: Internet security is not “insurance”



Posted by: David Scott
acceptable use, cloud security, content management, data breach, data protection, internet security, security breach, SMB security, SME security, the cloud

 

It seems that one major online breach after another occurs: ...


July 18, 2011  12:50 PM

European Union Considering Breach Notifications Rules



Posted by: David Scott
breach notification, breach notification law, breach notification rules, content management, content management policy, data breach, data integrity, data security, government breach, government data breach, IT security, security plans, security policy

 

It’s interesting to me that the European Union’s European Commission is...


July 16, 2011  10:38 AM

Pentagon Loses 24,000 Files to Theft – and lessons to you



Posted by: David Scott
000 files, classified data theft, data privacy, data security, defense contractor loses files, Deputy Defense Secretary William Lynn, foreign intruder steals data, foreign intruder steals files, information privacy, pentagon loses 24, Pentagon loses files, security policy, theft of 24

 

The Pentagon is supposedly mounting a new cyber security initiative...


July 13, 2011  1:05 PM

Information Privacy and Bank Debit Cards



Posted by: David Scott
ATM cards, ATM machines, bank breach, bank card breach, bank card data, bank card security, bank cards, bank fraud, bank PIN numbers, bank security, credit card, credit card breach, credit card data, financial institution, financial institution security, financial security, financial system, PIN numbers, US mail

 

An interesting thing happened to me on the way back from my mailbox the...


July 12, 2011  10:26 AM

Department of Justice: Forcing you to decrypt?



Posted by: David Scott
bank fraud, data encryption, data privacy, decryption, file access, file passphrase, IT passphrase, IT password, money laundering, PGP passphrase, privacy, Ramona Fricosu, Supreme Court encryption, U.S. Justice Department, U.S. Supreme Court data encryption, wire fraud

 

Does your right to remain silent, as protected by the U.S. Constitution’s...


July 11, 2011  12:32 PM

Pre-Infected Components and Software Entering the U.S.?



Posted by: David Scott
anti-virus, botnet, computer inspection, computer survey, computer virus, intellectual property, keystroke logging, keystroke monitoring, malware, pre-infected components, security defeats, software import, spyware, virus, virus removal

 

According to a top Homeland Security official, testifying before a hearing...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: