The Business-Technology Weave:

data backup

1

April 9, 2011  11:36 AM

In The Cloud, and… In-Accessible?



Posted by: David Scott
centralized data, cloud, cloud applications, cloud apps, cloud reliability, cloud security, data, data access, data accessibility, data backup, data breach, data breach expense, data compromise, data control, data integrity, data loss, data loss prevention, data management, data security, offsite backup, offsite data, the cloud

 

I was doing a bit of reading regarding Amazon’s new Amazon Cloud...

April 7, 2011  7:40 AM

Epsilon – Oopsilon



Posted by: David Scott
cost of data breach, data backup, data breach, data breach expense, data compromise, data exposure, data loss, data phishing, epsilon, phish, phishing

Only the dead have seen the last of data breaches (with apologies to Plato).

Hey – have you heard about this Epsilon thing?     Bookmark and Share     0 Comments     RSS Feed     Email a friend


March 28, 2011  3:04 PM

Large security vendor suffers breach



Posted by: David Scott
access security, best business practice, best security practice, breach notification, business security plan, computer security, content security, cost of data breach, cyber security, cybersecurity, data access, data backup, data breach, data compromise, data integrity, data liability, data loss prevention, data security, device security, employee security, employer security, enterprise security, government security, info security, IT security, securing data

 

It’s been reported that RSA Security has...


March 23, 2011  11:00 AM

Web 2 and You



Posted by: David Scott
cloud applications, cloud apps, Cloud Computing, cloud security, data backup, MS-Office, MS-Office corruption, MS-Outlook, MS-Outlook corruption, MS-Outook re-install, offsite storage, Outlook, personal storage file, PST, PST corruption, PST recovery, PST repair tool, the cloud, virtual application, virtual apps, virtual infrastructure, virtual meetings, virtual server, virtual space, virtual teams, virtual-private-network, vpn, web 2.0, web applications, web apps, web collaboration, web content, web enablement, web security

 

Web 2.0, that is:  Increasingly, individuals and...


March 22, 2011  7:50 AM

Back Up, Back Up, Back Up



Posted by: David Scott
backup, backup and recovery, backup drive, backup routine, backup software, comprehensive backup, computer backup, cost of data breach, data backup, data breach, data breach expense, data breach law, data compromise, data exposure, data integrity, data liability, data loss, synchronize backup

 

Well, it happened to me:  My laptop’s operating...


November 29, 2010  9:44 AM

WikiLeaks: Lessons of Content and Its Management for the Organization



Posted by: David Scott
content, content management, data, data access, data backup, data breach, data theft, national security, state department cables, U.S. security, WikiLeaks

 

Security and data breaches are overwhelmingly due to human...


April 27, 2010  1:02 PM

An IT Deficit



Posted by: David Scott
acceptable use, accpetable use, backup and recovery, BIT, business implementation team, business liabilitiy, centralized data, content, content management, data, data backup, data liability, data management, data recovery

 

A couple articles ago, I talked about a business deficit.  It’s only fair we...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: