The Business-Technology Weave:

data exposure

1

October 23, 2011  12:54 PM

Massachusetts and Breach: Yielding a Comprehensive Understanding of Risk



Posted by: David Scott
content management, data breach, data exposure, data loss, data security, data theft, massachusetts breach

According to the Massachusetts...

June 17, 2011  12:05 PM

Security, Privacy, Your Organization… and YOU



Posted by: David Scott
best security practice, business continuity, business exposure, business liability, content management, content security, cost of data breach, cyber attack, cyber security, cybersecurity, data breach, data breach expense, data exposure, data privacy, disaster awareness, disaster awareness preparedness and recovery, disaster plan, disaster prevention, Executive Director, information privacy, International Association of Privacy Professionals, security officer, Trevor Hughes, workplace privacy

 

I was reading an interesting article the other day,


April 29, 2011  12:04 PM

Ahhh, New York City you talk a lot; let’s have a look at ya…



Posted by: David Scott
access security, best security practice, business breach, business security plan, computer security, content management, content security, cost of data breach, cyber security, data breach, data disclosure, data exposure, data security, enterprise security, human error, New York Yankees, New York Yankees data breach, NY Yankees, NY Yankees data breach, security breach

 

(With apologies to Mick Jagger/Rolling Stones -  NYC,...


April 7, 2011  7:40 AM

Epsilon – Oopsilon



Posted by: David Scott
cost of data breach, data backup, data breach, data breach expense, data compromise, data exposure, data loss, data phishing, epsilon, phish, phishing

Only the dead have seen the last of data breaches (with apologies to Plato).

Hey – have you heard about this Epsilon thing?     Bookmark and Share     0 Comments     RSS Feed     Email a friend


March 22, 2011  7:50 AM

Back Up, Back Up, Back Up



Posted by: David Scott
backup, backup and recovery, backup drive, backup routine, backup software, comprehensive backup, computer backup, cost of data breach, data backup, data breach, data breach expense, data breach law, data compromise, data exposure, data integrity, data liability, data loss, synchronize backup

 

Well, it happened to me:  My laptop’s operating...


December 1, 2010  2:03 PM

Content Management and Acceptable Use Policies



Posted by: David Scott
acceptable use, business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, information dump, information leak, information theft, project control, project management, WikiLeaks

 


November 30, 2010  11:14 AM

Content Continued: Minimizing exposure and liability



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

[Note:  If you haven’t yet, you may wish to start with “


November 30, 2010  10:16 AM

Content, Use and Control



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

In view of the recent WikiLeaks leak (


May 20, 2010  1:55 PM

Insecurity, Part III: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business policy, business risk, business security, data breach, data exposure, data security, data theft, IT policy, IT security, IT Wars, malware, the business-technology weave

[As necessary, please see the first article...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: