August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...


September 1, 2011  1:10 PM

Work Policies and Employee Compliance



Posted by: David Scott
acceptable use, acceptable use policy, acceptable use training, best business practice, best employee practice, business vulnerabilities, business vulnerability, computer security, computer use, computer vulnerabilities, computer vulnerability, content management, content management policy, content management training, employee handbook, human resources, security policy, security training, workplace compliance, workplace policies, workplace policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 16, 2011  10:58 AM

Business and IT, Pt. 45: A Business Deficit



Posted by: David Scott
best business practice, best IT practice, business and IT, business deficit, business qualification, business training, IT deficit, IT qualification, IT training

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 13, 2011  11:06 AM

Business and IT, Pt. II: Who does what, why, and when?



Posted by: David Scott
best business practice, best IT practice, best practice, business management, business plans, directing business, directing technology, integrating technology to business, IT plans, managing business, managing technology

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 12, 2011  12:30 PM

BUSINESS AND IT, Pt. I: Who does what, why, and when?



Posted by: David Scott
best business practice, best IT practice, best practice, business and IT, business discipline, business responsibility, division of duty, IT activity, IT assignment, IT discipline, IT responsibility, IT's role

 

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 31, 2011  9:45 AM

Frankensteins, Pt. III – A Simple Assessment to Setting Structure



Posted by: David Scott
best business practice, best IT practice, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business practice, IT department, IT positions

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 25, 2011  11:57 AM

In the Dark: Folks are just now catching up to The BTW



Posted by: David Scott
best business practice, business ability, business adaptability, business alignment, business and IT policy, business and IT planning, business and IT solutions, business breach, business challenge, business continuity, cyber attack, cyber security, cyber threat, cyber training, cyber war, cyberwar, DAPR, disaster awareness, disaster awareness preparedness and recovery, disaster plan, disaster prevention, disaster recovery planning, DR, DR planning, in the dark, in the dark: crucial industries confront cyber attacks

 

Not to sound too forward-thinking, but McAfee just released an interesting...


March 31, 2011  12:08 PM

Social Networking Redux: Perception Management



Posted by: David Scott
best business practice, business adaptability, business agility, business and IT policy, business and IT, business and IT solutions, business and social networking, business attitude, business beliefs, business breach, business challenge, business change, business communication, business protocol, facebook, facebook peril, myspace, myspace peril, online challenge, online identity, online security, perception management, public relations, small and medium business, small business and social networking, SMB, SMB and social networking, social networking, social networking peril, youtube peril

 

Back in the days of my misspent youth, as CIO in a Fortune100...


March 28, 2011  3:04 PM

Large security vendor suffers breach



Posted by: David Scott
access security, best business practice, best security practice, breach notification, business security plan, computer security, content security, cost of data breach, cyber security, cybersecurity, data access, data backup, data breach, data compromise, data integrity, data liability, data loss prevention, data security, device security, employee security, employer security, enterprise security, government security, info security, IT security, securing data

 

It’s been reported that RSA Security has...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: