April 29, 2011  12:04 PM

Ahhh, New York City you talk a lot; let’s have a look at ya…

Posted by: David Scott
access security, best security practice, business breach, business security plan, computer security, content management, content security, cost of data breach, cyber security, data breach, data disclosure, data exposure, data security, enterprise security, human error, New York Yankees, New York Yankees data breach, NY Yankees, NY Yankees data breach, security breach


(With apologies to Mick Jagger/Rolling Stones -  NYC,...

March 28, 2011  3:04 PM

Large security vendor suffers breach

Posted by: David Scott
access security, best business practice, best security practice, breach notification, business security plan, computer security, content security, cost of data breach, cyber security, cybersecurity, data access, data backup, data breach, data compromise, data integrity, data liability, data loss prevention, data security, device security, employee security, employer security, enterprise security, government security, info security, IT security, securing data


It’s been reported that RSA Security has...

March 12, 2011  1:49 PM

Mobile Security: On the go… it can be gone…

Posted by: David Scott
computer security, data loss, data theft, flash drive, laptop, mobile data, mobile device, mobile device loss, mobile device theft, mobile security, network security, remote data delete, remote data erase, remote data wipe, smart phone, smartphone, tablet, unauthorized access


No matter how tight your security policies, no matter how regularized your...

January 29, 2011  1:20 PM

Diminishing Return

Posted by: David Scott
30-day support, backup agent, backup and recovery, backup drive, backup software, comprehensive backup, computer, computer registration, computer security, disaster plan, disaster planning, disaster recovery, external drive, external hard drive, font, limited support, online support, product registration, Seagate, Seagate external drive, software registration, synchronize backup


Not too long ago I purchased a Seagate 320 Gb drive.  I...

September 10, 2010  12:27 PM

Check Your Acceptable Use Policy – Is This Missing?

Posted by: David Scott
acceptable use, acceptable use policy, business policy, business security, computer security, inappropriate use, IT policy, IT security, unacceptable use

In reviewing some Acceptable Use policies, I’ve noticed the usual cautions about adherence to authorized access, the caveats about protecting your ID...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: