The Business-Technology Weave:

data security


June 17, 2013  1:20 PM

Concerned About Gov’t. Snooping? There’s an app for that



Posted by: David Scott
cyber awareness, cyber security, cyber security and government, cyber training, data accessibility, data encryption, data legislation, data privacy, data protection, data security, decryption, e-mail breach, e-mail security

PadlockRegardless of the...

December 13, 2011  9:53 AM

View EVERY Action through Security’s Prism



Posted by: David Scott
content, content handling, content security, data security, e-mail, e-mail mistake, e-mail security, reply, reply all

 


December 7, 2011  10:28 AM

Looming Liability: Non-Work Apps in the Workplace



Posted by: David Scott
business productivity, content management, data security, employee monitoring, employee training, enterprise security, IT productivity, IT training, non-work applications, Non-work apps, small-to-medium business security, SMB security, workplace security

 


December 5, 2011  8:26 AM

PC Magazine’s “The 25 Worst Passwords of 2011”



Posted by: David Scott
authentication, computer password, content security, data breach, data security, data theft, identity theft, online credentials, online security, password security, user ID, worst passwords, worst passwords of 2011

 


December 1, 2011  12:21 PM

Cyber Crime to Invade Public Cloud… and more…



Posted by: David Scott
cloud security, content management, cyber crime, data breach, data security, data theft, Hacker, hacking, hacktivism, hacktivist, IT governance, security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 22, 2011  12:01 PM

Cyber-terror, Hacktivism, etc.: New thoughts on security for the modern organization



Posted by: David Scott
acceptable use, content management, cyber security, cyber terrorism, data breach, data security, data theft, hack, hacking, hacktivism, hacktivists, Illinois water plant, security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 16, 2011  12:45 PM

Help Propagate “The Business-Technology Weave” – and a bonus!



Posted by: David Scott
BTW, CMS, content management, cyber terror, cybersecurity, cyberterror, data security, futilitycloset.com, IT governance, the business-technology weave

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 14, 2011  3:06 PM

Google Says Government Requests for User Data on the Rise



Posted by: David Scott
CMS, content management, content security, data security, google government requests, google report, Google Transparency Report, government request for data, government request for information, government request for user data, government requests for data, user content

 


October 27, 2011  2:44 PM

HP Experience Yields Appreciation of New Areas of Risk, Pt. II: Apple vs. PC



Posted by: David Scott
Apple, apple computers, backup plan, backup plan and policy, backup policy, backup policy and plan, comprehensive backup, content management, content management policy, content security, data recovery, data security, data surety, Hewlett-Packard, HP, HP computer, HP laptop

 


October 26, 2011  2:34 PM

An Experience with HP Yields Appreciation for New Area of Risk



Posted by: David Scott
Apple, apple computers, backup plan, backup plan and policy, backup policy, backup policy and plan, comprehensive backup, content management, content management policy, content security, data recovery, data security, data surety, Hewlett-Packard, HP, HP computer, HP laptop

Bookmark and Share     3 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: