July 20, 2011  10:46 AM

The Cloud: Internet security is not “insurance”



Posted by: David Scott
acceptable use, cloud security, content management, data breach, data protection, internet security, security breach, SMB security, SME security, the cloud

 

It seems that one major online breach after another occurs: ...


May 26, 2011  1:09 PM

The Cloud: Forecast remains a bit cloudy for security



Posted by: David Scott
attacks on the cloud, best IT practice, cloud attacks, Cloud Computing, cloud contract, cloud security, SaaS, software as a service, the cloud

 

Several things are on the rise as concerns the Cloud.


April 18, 2011  9:40 AM

More Clouds in the Cloud – Consider DropBox



Posted by: David Scott
application as a service, cloud access, cloud applications, cloud apps, cloud security, cloud services, cloud vulnerabilities, computing as a service, data as a service, hardware as a service, IT security, platform as a service, software as a service, the cloud

 

I hate to sound prescient, but these Cloud apps, services, and storage areas...


April 9, 2011  11:36 AM

In The Cloud, and… In-Accessible?



Posted by: David Scott
centralized data, cloud, cloud applications, cloud apps, cloud reliability, cloud security, data, data access, data accessibility, data backup, data breach, data breach expense, data compromise, data control, data integrity, data loss, data loss prevention, data management, data security, offsite backup, offsite data, the cloud

 

I was doing a bit of reading regarding Amazon’s new Amazon Cloud...


March 23, 2011  11:00 AM

Web 2 and You



Posted by: David Scott
cloud applications, cloud apps, Cloud Computing, cloud security, data backup, MS-Office, MS-Office corruption, MS-Outlook, MS-Outlook corruption, MS-Outook re-install, offsite storage, Outlook, personal storage file, PST, PST corruption, PST recovery, PST repair tool, the cloud, virtual application, virtual apps, virtual infrastructure, virtual meetings, virtual server, virtual space, virtual teams, virtual-private-network, vpn, web 2.0, web applications, web apps, web collaboration, web content, web enablement, web security

 

Web 2.0, that is:  Increasingly, individuals and...


February 15, 2011  12:54 PM

The Next Pearl Harbor?



Posted by: David Scott
business policy, business security, cloud security, cyber attack, cyber threat, cyber training, cyber war, DAPR, disaster awareness, disaster recovery, DR, electro-magnetic pulse, electromagnetic pulse, emp, IT plans, IT policy, Pearl Harbor, preparedness and recovery, security awareness, Security Plan, security training, World War II, WWII

 

A   Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 2, 2010  10:35 AM

Cloud Computing and Security: Forecast Cloudy?



Posted by: David Scott
business continuity, business security, Cloud Computing, cloud security, IT security

 

With the advent of Cloud Computing – that is, Internet-based computing – many are asking, “Is it secure?”


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: