August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...


August 16, 2011  10:58 AM

Business and IT, Pt. 45: A Business Deficit



Posted by: David Scott
best business practice, best IT practice, business and IT, business deficit, business qualification, business training, IT deficit, IT qualification, IT training

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 13, 2011  11:06 AM

Business and IT, Pt. II: Who does what, why, and when?



Posted by: David Scott
best business practice, best IT practice, best practice, business management, business plans, directing business, directing technology, integrating technology to business, IT plans, managing business, managing technology

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 12, 2011  12:30 PM

BUSINESS AND IT, Pt. I: Who does what, why, and when?



Posted by: David Scott
best business practice, best IT practice, best practice, business and IT, business discipline, business responsibility, division of duty, IT activity, IT assignment, IT discipline, IT responsibility, IT's role

 

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 31, 2011  9:45 AM

Frankensteins, Pt. III – A Simple Assessment to Setting Structure



Posted by: David Scott
best business practice, best IT practice, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business practice, IT department, IT positions

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 21, 2011  9:13 AM

The Real Heart of Security: Employee Awareness Program(s)



Posted by: David Scott
acceptable use, allowable use, awareness program, best IT practice, best practice, business continuity, business security, content management, data breach, data security, e-mail policy, eCulture, eDiscovery, employee awareness, internet use, IT security, security prism

 

Today, employee error and otherwise casual approaches to security is causing...


May 26, 2011  1:09 PM

The Cloud: Forecast remains a bit cloudy for security



Posted by: David Scott
attacks on the cloud, best IT practice, cloud attacks, Cloud Computing, cloud contract, cloud security, SaaS, software as a service, the cloud

 

Several things are on the rise as concerns the Cloud.


October 18, 2010  10:24 AM

Oh Oh – Facebook Suffers Breach



Posted by: David Scott
best business practice, best informaiton technology practice, best IT practice, business practice, business security, data breach, data security, data theft, information systems, IT security

 

How does the biggest social networking site suffer a data...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: