The Business-Technology Weave:

acceptable use


November 29, 2012  6:14 PM

CMS: Getting to the “System” of Content Management



Posted by: David Scott
acceptable use, acceptable use training, CMS, content management system

[Note:  You may wish to visit the...

August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...


August 31, 2012  2:29 PM

Crucial Considerations when Going Mobile, Pt. II – Training



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training

Most organizations already have a schedule of regularized training – both for core, mission-critial, applications as they undergo revision and update - and in accommodating new apps and business methods. Whether incorporating mobile as a formal addition to your business enablements, or in...


June 11, 2012  1:36 PM

The Mobile Revolution: Don’t get caught flat-footed



Posted by: David Scott
acceptable use, android, bring your own device, business security statistics, business security stats, BYOD, cellular, iPad, iPhone, IT security, IT security statistics, IT security stats, mobile access, mobile application, mobile application development, mobile challenge, mobile development, mobile enablement, mobile enterprise, mobile planning, mobile policies, mobile policy, mobile programming, mobile security, mobile technologies, mobile technology, mobile’s future, security statistics, security stats, smartphone, tablet


November 22, 2011  12:01 PM

Cyber-terror, Hacktivism, etc.: New thoughts on security for the modern organization



Posted by: David Scott
acceptable use, content management, cyber security, cyber terrorism, data breach, data security, data theft, hack, hacking, hacktivism, hacktivists, Illinois water plant, security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 1, 2011  1:10 PM

Work Policies and Employee Compliance



Posted by: David Scott
acceptable use, acceptable use policy, acceptable use training, best business practice, best employee practice, business vulnerabilities, business vulnerability, computer security, computer use, computer vulnerabilities, computer vulnerability, content management, content management policy, content management training, employee handbook, human resources, security policy, security training, workplace compliance, workplace policies, workplace policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 26, 2011  10:09 AM

Social Networking: Sense and Sobriety



Posted by: David Scott
acceptable use, communications policy, content management, risk analysis, security policy, social networking, social networking and criminal, social networking and vacation, social networking crime, social networking liability, social networking security, survey for risk

 

Today’s social networking environment is interesting from a variety of...


July 20, 2011  10:46 AM

The Cloud: Internet security is not “insurance”



Posted by: David Scott
acceptable use, cloud security, content management, data breach, data protection, internet security, security breach, SMB security, SME security, the cloud

 

It seems that one major online breach after another occurs: ...


July 5, 2011  9:56 AM

Google and Information Privacy



Posted by: David Scott
acceptable use, content management, data breach, data security, google, google and privacy, government information request, information privacy, information security, user policy

 

Google has reported it gave user information to the Federal Government 94% of...


June 25, 2011  8:11 AM

Social Intelligence



Posted by: David Scott
acceptable use, content management, employee security, Federal Trade Commission, SIC, social intelligence, social intelligence corporation, social networking, social networking peril

 

We’ve discussed online social networking peril here at length, but there...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: