The Business-Technology Weave:

content security


June 6, 2013  1:52 PM

Secret E-mail Accounts: How many does your organization have?



Posted by: David Scott
acceptable use policy, acceptable use training, content liability, content management policy, content security, e-mail, e-mail administration, e-mail breach, e-mail management, e-mail policy, e-mail security

EnvelopeRecent high-profile...

March 22, 2013  12:24 PM

Trends Regarding Content and Integrity



Posted by: David Scott
CMS, content, content awareness, content control, content liability, content management policy, content security, contingency planning

When...


December 13, 2011  9:53 AM

View EVERY Action through Security’s Prism



Posted by: David Scott
content, content handling, content security, data security, e-mail, e-mail mistake, e-mail security, reply, reply all

 


December 5, 2011  8:26 AM

PC Magazine’s “The 25 Worst Passwords of 2011”



Posted by: David Scott
authentication, computer password, content security, data breach, data security, data theft, identity theft, online credentials, online security, password security, user ID, worst passwords, worst passwords of 2011

 


November 14, 2011  3:06 PM

Google Says Government Requests for User Data on the Rise



Posted by: David Scott
CMS, content management, content security, data security, google government requests, google report, Google Transparency Report, government request for data, government request for information, government request for user data, government requests for data, user content

 


October 27, 2011  2:44 PM

HP Experience Yields Appreciation of New Areas of Risk, Pt. II: Apple vs. PC



Posted by: David Scott
Apple, apple computers, backup plan, backup plan and policy, backup policy, backup policy and plan, comprehensive backup, content management, content management policy, content security, data recovery, data security, data surety, Hewlett-Packard, HP, HP computer, HP laptop

 


October 26, 2011  2:34 PM

An Experience with HP Yields Appreciation for New Area of Risk



Posted by: David Scott
Apple, apple computers, backup plan, backup plan and policy, backup policy, backup policy and plan, comprehensive backup, content management, content management policy, content security, data recovery, data security, data surety, Hewlett-Packard, HP, HP computer, HP laptop

Bookmark and Share     3 Comments     RSS Feed     Email a friend


June 17, 2011  12:05 PM

Security, Privacy, Your Organization… and YOU



Posted by: David Scott
best security practice, business continuity, business exposure, business liability, content management, content security, cost of data breach, cyber attack, cyber security, cybersecurity, data breach, data breach expense, data exposure, data privacy, disaster awareness, disaster awareness preparedness and recovery, disaster plan, disaster prevention, Executive Director, information privacy, International Association of Privacy Professionals, security officer, Trevor Hughes, workplace privacy

 

I was reading an interesting article the other day,


May 12, 2011  11:13 AM

Access, Access, Access



Posted by: David Scott
content access, content security, data access, data security, employee access, employee security, information access, information security, security training, small and medium business, small-to-medium business, smartphones and business, SMB

 

Hey, if ya can’t access it, what good is it?  Well,...


May 2, 2011  10:57 AM

Data, Human Error, and an Apology [bonus: a Warning]



Posted by: David Scott
application error, content management, content security, cut-and-paste, cut-and-paste error, data breach, data security, e-mail blast, human error, MS-Outlook, MS-Windows, program error, Windows 7

 

Mistakes will happen, as we all know.

 


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: