The Business-Technology Weave:

Add new tag

1

October 13, 2011  9:37 AM

Insecure Security: A Lesson from the Air Force for Your Org



Posted by: David Scott
Add new tag, computer virus, danger room, keystroke logging, keystroke monitoring, malware, predator and reaper, predator drones, reaper drones, virus, wired, wired.com

June 27, 2011  7:45 AM

Social Intelligence, Part II



Posted by: David Scott
Add new tag, internet security, interviewing, job search, job searching, online identity, online reputation, online security, online wellness, personal security, reputation.com, social intelligence, social intelligence corporation, social network security, social networking

 

Today’s article follows on to yesterday’s


June 8, 2011  8:33 AM

Who “Drives” DAPR?



Posted by: David Scott
Add new tag, business continuity, business planning, business plans, business policy, DAPR, disaster planning, disaster recovery, IDRU, IT plans, IT policy

(Note:  See prior two articles if necessary)

Who drives DAPR One Guess… Particularly for Business, it is inadvisable to rely on a simple conversation with IT regarding this area....


January 21, 2011  12:43 PM

107 Trillion E-mails Sent Last Year



Posted by: David Scott
acceptable use, Add new tag, blog, blog policy, blogging, blogging at work, blogs, business breach, content management, data breach, data security, e-mail policy, e-mail security, human error, pingdom, security policy, social network policy, social networking, social networking and business

 

Don’t Miss the Obvious: ...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: