The Business-Technology Weave:

data recovery

1

October 27, 2011  2:44 PM

HP Experience Yields Appreciation of New Areas of Risk, Pt. II: Apple vs. PC



Posted by: David Scott
Apple, apple computers, backup plan, backup plan and policy, backup policy, backup policy and plan, comprehensive backup, content management, content management policy, content security, data recovery, data security, data surety, Hewlett-Packard, HP, HP computer, HP laptop

 

October 26, 2011  2:34 PM

An Experience with HP Yields Appreciation for New Area of Risk



Posted by: David Scott
Apple, apple computers, backup plan, backup plan and policy, backup policy, backup policy and plan, comprehensive backup, content management, content management policy, content security, data recovery, data security, data surety, Hewlett-Packard, HP, HP computer, HP laptop

Bookmark and Share     3 Comments     RSS Feed     Email a friend


June 24, 2011  7:47 AM

UK, France and Germany: 84% of companies have suffered breach in the past year



Posted by: David Scott
business continuity, business security, data breach, data recovery, IT security, Juniper, Juniper Networks, Juniper Networks Survey, Security Plan, security policy

 

From Europe comes incredible news, as reported by Juniper...


December 1, 2010  2:03 PM

Content Management and Acceptable Use Policies



Posted by: David Scott
acceptable use, business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, information dump, information leak, information theft, project control, project management, WikiLeaks

 


November 30, 2010  11:14 AM

Content Continued: Minimizing exposure and liability



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

[Note:  If you haven’t yet, you may wish to start with “


November 30, 2010  10:16 AM

Content, Use and Control



Posted by: David Scott
business exposure, business liability, content, content control, content liability, content management, content management system, data access, data breach, data control, data exposure, data management, data recovery, data security, data theft, project control, project management, WikiLeaks

 

In view of the recent WikiLeaks leak (


April 27, 2010  1:02 PM

An IT Deficit



Posted by: David Scott
acceptable use, accpetable use, backup and recovery, BIT, business implementation team, business liabilitiy, centralized data, content, content management, data, data backup, data liability, data management, data recovery

 

A couple articles ago, I talked about a business deficit.  It’s only fair we...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: