The Business-Technology Weave:

data compromise

1

April 28, 2011  7:44 AM

Security, Sony, and Station (PlayStation), Part 45



Posted by: David Scott
authentication, authentication questions, cost of data breach, credential information, credentialing information, credit card breach, credit card data, data breach, data breach expense, data compromise, data control, ID, login, password, playstation, Sony, Sony PlayStation, user data, user ID

 

Just kidding – it’s only Part 2.  (Please see first...

April 9, 2011  11:36 AM

In The Cloud, and… In-Accessible?



Posted by: David Scott
centralized data, cloud, cloud applications, cloud apps, cloud reliability, cloud security, data, data access, data accessibility, data backup, data breach, data breach expense, data compromise, data control, data integrity, data loss, data loss prevention, data management, data security, offsite backup, offsite data, the cloud

 

I was doing a bit of reading regarding Amazon’s new Amazon Cloud...


April 7, 2011  7:40 AM

Epsilon – Oopsilon



Posted by: David Scott
cost of data breach, data backup, data breach, data breach expense, data compromise, data exposure, data loss, data phishing, epsilon, phish, phishing

Only the dead have seen the last of data breaches (with apologies to Plato).

Hey – have you heard about this Epsilon thing?     Bookmark and Share     0 Comments     RSS Feed     Email a friend


March 28, 2011  3:04 PM

Large security vendor suffers breach



Posted by: David Scott
access security, best business practice, best security practice, breach notification, business security plan, computer security, content security, cost of data breach, cyber security, cybersecurity, data access, data backup, data breach, data compromise, data integrity, data liability, data loss prevention, data security, device security, employee security, employer security, enterprise security, government security, info security, IT security, securing data

 

It’s been reported that RSA Security has...


March 22, 2011  7:50 AM

Back Up, Back Up, Back Up



Posted by: David Scott
backup, backup and recovery, backup drive, backup routine, backup software, comprehensive backup, computer backup, cost of data breach, data backup, data breach, data breach expense, data breach law, data compromise, data exposure, data integrity, data liability, data loss, synchronize backup

 

Well, it happened to me:  My laptop’s operating...


December 14, 2010  12:43 PM

Data Breaching and Lessons of Legacy



Posted by: David Scott
business and IT solutions, business security, business solutions, business-technology weave, CMS, content management system, data breach, data breaching, data compromise, data theft, eCulture, ID theft, IT security, IT solutions, stolen identity, university of wisconsin

 

I see where the University of...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: