The Business-Technology Weave:

business risk

1

April 8, 2012  12:58 PM

Hackers are Hitting Macs with a Major Virus



Posted by: David Scott
best practice, business risk, data breach, data theft, IT risk, IT security, IT Wars, Mac, Mac malware, security policy, the business-technology weave, virus

March 1, 2012  12:28 PM

Leveraging Knowledge Requires… Knowledge



Posted by: David Scott
best practice, business risk, data breach, data theft, IT knowledge, IT risk, IT security, IT training, IT Wars, security policy, the business-technology weave

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 4, 2010  12:04 PM

Policy and Planning in View of Risk’s Velocity



Posted by: David Scott
business and IT policy, business and IT planning, business planning, business plans, business policy, business risk, IT planning, IT plans, IT policy, IT risk, risk analysis, security policy, velocity of risk

 

[Note:  You may wish to see


October 29, 2010  12:16 PM

Velocity of Risk



Posted by: David Scott
2010 Global SMB Information Protection Survey, AITP, Association of Information Technology Professionals, business management, business policy, business risk, business security, business security plan, information securrtiy, IT risk, IT security, risk management, Security Plan, securtiy policy, velocity of risk

 

Wow.  I was reading an article in InformationWeek...


June 7, 2010  4:50 AM

Business Continuity and Data Breach; hardly mutually exclusive, and yet…



Posted by: David Scott
business continuity, business risk, contingency planning, contingency plans, data breach, disaster planning, disaster prevention, disaster recovery, risk management

 

According to a recent survey by BDO, “Business Continuity” ranks higher as a security concern than “Data Breach”...


May 20, 2010  1:55 PM

Insecurity, Part III: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business policy, business risk, business security, data breach, data exposure, data security, data theft, IT policy, IT security, IT Wars, malware, the business-technology weave

[As necessary, please see the first article...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: