The Business-Technology Weave:

IT security


March 30, 2013  3:37 PM

Unburdening Security



Posted by: David Scott
business adaptability, business agility, business and IT change, business effectiveness, business success, IT adaptability, IT agility, IT and business change, IT burden, IT effectiveness, IT responsibility, IT security, IT services, IT success, IT's role, IT-business alignment

As a follow-on to...

June 11, 2012  1:36 PM

The Mobile Revolution: Don’t get caught flat-footed



Posted by: David Scott
acceptable use, android, bring your own device, business security statistics, business security stats, BYOD, cellular, iPad, iPhone, IT security, IT security statistics, IT security stats, mobile access, mobile application, mobile application development, mobile challenge, mobile development, mobile enablement, mobile enterprise, mobile planning, mobile policies, mobile policy, mobile programming, mobile security, mobile technologies, mobile technology, mobile’s future, security statistics, security stats, smartphone, tablet


April 8, 2012  12:58 PM

Hackers are Hitting Macs with a Major Virus



Posted by: David Scott
best practice, business risk, data breach, data theft, IT risk, IT security, IT Wars, Mac, Mac malware, security policy, the business-technology weave, virus


March 1, 2012  12:28 PM

Leveraging Knowledge Requires… Knowledge



Posted by: David Scott
best practice, business risk, data breach, data theft, IT knowledge, IT risk, IT security, IT training, IT Wars, security policy, the business-technology weave

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 29, 2011  8:20 AM

Cyber Espionage in the Modern Age



Posted by: David Scott
content management, cyber attack, cyber awareness, cyber crime, cyber espionage, cyber security, cyber security and government, cyber threat, cyber war, cyber warfare, cyberwar, cyberwarfare, data and overseas travel, data security, IT security

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 28, 2011  10:31 AM

Software Updates: Consider carefully



Posted by: David Scott
anti-virus, antivirus, computer virus, content management, data protection, data theft, e-mail spoof, IT security, malware, online spoof, remind me later, Security Plan, security policy, security update, software patch, spoof, update now, virus, virus removal

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 20, 2011  2:24 PM

The Business-Technology Challenge



Posted by: David Scott
5 year plan, business and IT, business and technology, business challenge, business plans, business plans and policy, business policy, five-year plans, IT challenge, IT governance, IT plans, IT policy, IT security, one-year plans, work challenge, work challenges

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 23, 2011  12:47 PM

Elevated Standards of Security Not Just for High Profile Orgs



Posted by: David Scott
anonymous, data breach, data hack, data theft, hacking attempt, hacking group anonymous, IT security, rural law attacked by anonymous, rural law enforcement

 


July 18, 2011  12:50 PM

European Union Considering Breach Notifications Rules



Posted by: David Scott
breach notification, breach notification law, breach notification rules, content management, content management policy, data breach, data integrity, data security, government breach, government data breach, IT security, security plans, security policy

 

It’s interesting to me that the European Union’s European Commission is...


June 24, 2011  7:47 AM

UK, France and Germany: 84% of companies have suffered breach in the past year



Posted by: David Scott
business continuity, business security, data breach, data recovery, IT security, Juniper, Juniper Networks, Juniper Networks Survey, Security Plan, security policy

 

From Europe comes incredible news, as reported by Juniper...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: