August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...


April 8, 2012  12:58 PM

Hackers are Hitting Macs with a Major Virus



Posted by: David Scott
best practice, business risk, data breach, data theft, IT risk, IT security, IT Wars, Mac, Mac malware, security policy, the business-technology weave, virus


March 1, 2012  12:28 PM

Leveraging Knowledge Requires… Knowledge



Posted by: David Scott
best practice, business risk, data breach, data theft, IT knowledge, IT risk, IT security, IT training, IT Wars, security policy, the business-technology weave

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 13, 2011  11:06 AM

Business and IT, Pt. II: Who does what, why, and when?



Posted by: David Scott
best business practice, best IT practice, best practice, business management, business plans, directing business, directing technology, integrating technology to business, IT plans, managing business, managing technology

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 12, 2011  12:30 PM

BUSINESS AND IT, Pt. I: Who does what, why, and when?



Posted by: David Scott
best business practice, best IT practice, best practice, business and IT, business discipline, business responsibility, division of duty, IT activity, IT assignment, IT discipline, IT responsibility, IT's role

 

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 21, 2011  9:13 AM

The Real Heart of Security: Employee Awareness Program(s)



Posted by: David Scott
acceptable use, allowable use, awareness program, best IT practice, best practice, business continuity, business security, content management, data breach, data security, e-mail policy, eCulture, eDiscovery, employee awareness, internet use, IT security, security prism

 

Today, employee error and otherwise casual approaches to security is causing...


June 18, 2011  10:33 AM

Duty has No Room for Conceit



Posted by: David Scott
best practice, business and IT, business plans, business policies, business policy, business survey, IT budget, IT burden, IT plans, IT policies, IT policy


March 1, 2010  2:43 PM

Welcome to “The Business-Technology Weave”



Posted by: David Scott
best practice, business, business-technology, business-technology weave, eCulture, IT, technology

Greetings fellow business and IT travelers, and welcome to “The Business-Technology Weave” (BTW). The BTW is essentially a brand of electronic culture – an eCulture if you will – that recognizes the interwoven reliance of business and technology, while...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: