The Business-Technology Weave:

Add new tag


October 13, 2011  9:37 AM

Insecure Security: A Lesson from the Air Force for Your Org

Posted by: David Scott
Add new tag, computer virus, danger room, keystroke logging, keystroke monitoring, malware, predator and reaper, predator drones, reaper drones, virus, wired,

June 27, 2011  7:45 AM

Social Intelligence, Part II

Posted by: David Scott
Add new tag, internet security, interviewing, job search, job searching, online identity, online reputation, online security, online wellness, personal security,, social intelligence, social intelligence corporation, social network security, social networking


Today’s article follows on to yesterday’s

June 8, 2011  8:33 AM

Who “Drives” DAPR?

Posted by: David Scott
Add new tag, business continuity, business planning, business plans, business policy, DAPR, disaster planning, disaster recovery, IDRU, IT plans, IT policy

(Note:  See prior two articles if necessary)

Who drives DAPR One Guess… Particularly for Business, it is inadvisable to rely on a simple conversation with IT regarding this area....

January 21, 2011  12:43 PM

107 Trillion E-mails Sent Last Year

Posted by: David Scott
acceptable use, Add new tag, blog, blog policy, blogging, blogging at work, blogs, business breach, content management, data breach, data security, e-mail policy, e-mail security, human error, pingdom, security policy, social network policy, social networking, social networking and business


Don’t Miss the Obvious: ...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: